--- /dev/null
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head>
+<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
+ <title>Xen.org Security Problem Response Process</title>
+ <meta name="description" content="Xen.org, home of the Xen® hypervisor, the powerful open source industry standard for virtualization.">
+ <meta name="keywords" content="xen 2.0, xen 3.0, hypervisor, server consolidation, open source, ian pratt, virtualization, virtualisation, xen, xensource, security, vulnerability, process">
+ <link href="/css/community_main7.css" rel="stylesheet" type="text/css">
+ <script type="text/javascript" src="/globals/javascript.js"></script>
+<script type="text/javascript" src="/globals/milonic_src.js"></script>
+ <script type="text/javascript">
+if(ns4)_d.write("<scr"+"ipt type=text/javascript src=/globals/mmenuns4.js><\/scr"+"ipt>");
+ else _d.write("<scr"+"ipt type=text/javascript src=/globals/mmenudom.js><\/scr"+"ipt>");
+
+</script>
+<script type="text/javascript" src="/globals/menu_data_xenorg_main.js"></script>
+ <meta http-equiv="Content-Type" content="text/html;charset=UTF-8">
+ <link rel="shortcut icon" href="/favicon.ico">
+
+</head>
+
+<body>
+<table border="0" cellpadding="0" cellspacing="0" align="center" id="xen_mainTable" >
+ <tr>
+ <td class="mainTableTopCell"> </td>
+ <td class="mainTableTopCell"> </td>
+ </tr>
+ <tr>
+ <td height="10" class="corner_tl"><a name="topofpage" id="topofpage"></a><img src="/images/globals/pixel.gif" alt="" width="700" height="9" /></td>
+ <td class="corner_tr"> </td>
+ </tr>
+<!-- header -->
+ <tr>
+ <td><table border="0" align="right" cellpadding="0" cellspacing="0" id="xen_navTopTable">
+<tr><td><div id="xen_navTop" > </div></td></tr></table><a href="/"><img src="/images/globals/xen_logo.gif" alt="Xen" width="149" height="67" border="0" id="xen" /></a><span class="xen_tag"> </span></td>
+ <td> </td>
+ </tr>
+ <tr>
+ <td id="xen_navMainContainer"><table width="535" border="0" align="right" cellpadding="0" cellspacing="0" id="xen_navMain">
+ <tr>
+ <td ><img src="/globals/anchorpix.gif" alt="" name="topnav_home" width="1" height="1" id="topnav_xenhome"><a href="/" onmouseover="popup('xenhome','topnav_xenhome')" onmouseout=popdown()>Home</a></td>
+ <td id="xen_navMainOn"><img src="/globals/anchorpix.gif" alt="" name="topnav_products" width="1" height="1" id="topnav_products"><a href="/products/" onmouseover="popup('products','topnav_products')" onmouseout=popdown()>Products</a></td>
+ <td ><img src="/globals/anchorpix.gif" alt="" name="topnav_support" width="1" height="1" id="topnav_support"><a href="/support/" onmouseover="popup('support','topnav_support')" onmouseout=popdown()>Support</a></td>
+ <td><img src="/globals/anchorpix.gif" alt="" name="topnav_community" width="1" height="1" id="topnav_community"><a href="/community/" onmouseover="popup('community','topnav_community')" onmouseout=popdown()>Community</a></td>
+ <td><img src="/globals/anchorpix.gif" alt="" name="topnav_news" width="1" height="1" id="topnav_news"><a href="http://blog.xen.org/" onmouseover="popup('news','topnav_news')" onmouseout=popdown()>Blog</a></td>
+ </tr>
+ </table></td>
+ <td id="xen_navMainContainerRt"> </td>
+ </tr>
+
+<!-- end header -->
+<!-- end header -->
+
+ <tr>
+ <td id="xen_navSecond"><a href="/products/index.html" >Products</a> | <a href="/products/downloads.html">Downloads</a> | <a href="/products/xenhyp.html">Xen Hypervisor</a> |
+ <a href="/products/xen_arm.html">Xen ARM</a> | <a href="/products/cloudxen.html">Xen Cloud Platform</a> | <a href="/products/projects.html" class="navSecondOnpage">Projects</a> | <a href="/community/projects.html" class="xen_last">Solution Search</a> </td>
+ <td id="xen_navSecondRt"> </td>
+ </tr>
+ <tr>
+
+ <td id="xen_content"><div class="xen_navThird"> </div>
+ <!-- begin callout -->
+
+ <table width="100%" cellspacing="0" cellpadding="0">
+ <tr valign="top">
+ <td width="200"><img src="/images/blog/XenGovernanceProposalQ2_2011.png" width="180"></td>
+ <td width="1"></td>
+ <td>
+
+ <h1>Xen.org Security Problem Response Process</h1>
+ <h2>Introduction</h2>
+ <p>Computer systems have bugs. Currently recognised best practice for bugs
+ with security implications is to notify significant downstream users in
+ private; leave a reasonable interval for downstreams to respond and prepare
+ updated software packages; then make public disclosure.</p>
+ <p>We want to encourage people to report bugs they find to us. Therefore we
+ will treat with respect the requests of discoverers, or other vendors, who
+ report problems to us.</p>
+
+ <h2>Specific process</h2>
+ <ol type="1">
+ <li><p>We request that anyone who discovers a vulnerability in xen.org
+ software reports this by email to security (at) xen (dot) org.</p>
+ <p>(This also covers the situation where an existing published
+ changeset is retrospectively found to be a security fix)</p></li>
+ <li><p>Immediately, and in parallel:</p></li>
+ <ol type="a">
+ <li><p>Those of us on the xen.org team who are aware of the problem
+ will notify security@xen if disclosure wasn't made there
+ already.</p></li>
+ <li><p>If the vulnerability is not already public, security@xen will
+ negotiate with discoverer regarding embargo date and disclosure
+ schedule. See below for detailed discussion.</p></li>
+ </ol>
+ <li>Furthermore, also in parallel:</li>
+ <ol type="a" start="3">
+ <li><p>security@xen will check whether the discoverer, or other people
+ already aware of the problem, have allocated a CVE number. If
+ not, we will acquire a CVE candidate number ourselves, and
+ make sure that everyone who is aware of the problem is also
+ aware of the CVE number.</p></li>
+ <li><p>If we think other software systems (for example, competing
+ hypervisor systems) are likely to be affected by the same
+ vulnerability, we will try to make those other projects aware
+ of the problem and include them in the advisory preparation
+ process.</p></li>
+ <p>(This may rely on the other project(s) having
+ documented and responsive security contact points)</p>
+ <li><p>We will prepare or check patch(es) which fix the vulnerability.
+ This would ideally include all relevant backports.</p></li>
+ <li><p>We will determine which systems/configurations/versions are
+ vulnerable, and what the impact of the vulnerability is.
+ Depending on the nature of the vulnerability this may involve
+ sharing information about the vulnerability (in confidence, if
+ the issue is embargoed) with hardware vendors and/or other
+ software projects.</p></li>
+ <li><p>We will write a Xen advisory including information from (b)-(f)</p></li>
+ </ol>
+
+ <li><p><b>Advisory pre-release:</b></p>
+ <p>This occurs only if the advisory is embargoed (ie, the problem is
+ not already public):</p>
+ <p>As soon as our advisory is available, we will send it,
+ including patches, to members of the Xen security pre-disclosure
+ list. For more information about this list, see below.</p>
+ <p>At this stage the advisory will be clearly marked with the embargo
+ date.</p>
+ </li>
+
+ <li><p><b>Advisory public release:</b></p>
+ <p>At the embargo date we will publish the advisory, and push
+ bugfix changesets to public revision control trees.</p>
+ <p>Public advisories will be posted to xen-devel,
+ xen-users and xen-annnounce and will be added to the
+ <a href="http://wiki.xen.org/wiki/Security_Announcements">Security Announcements wiki page</a>.</p>
+ <p>Copies will also be sent to the pre-disclosure list, unless
+ the advisory was already sent there previously during the embargo
+ period and has not been updated since.</p>
+ </li>
+
+ <li><p><b>Updates</b></p>
+ <p>If new information or better patches become available, or we
+ discover mistakes, we may issue an amended (revision 2 or later)
+ public advisory. This will also be sent to the pre-disclosure
+ list.</p>
+ </li>
+ </ol>
+
+ <h2>Embargo and disclosure schedule</h2>
+ <p>If a vulnerability is not already public, we would like to notify
+ significant distributors and operators of Xen so that they can prepare
+ patched software in advance. This will help minimise the degree to which
+ there are Xen users who are vulnerable but can't get patches.</p>
+ <p>As discussed, we will negotiate with discoverers about disclosure
+ schedule. Our usual starting point for that negotiation, unless there are
+ reasons to diverge from this, would be:</p>
+ <ol type="1">
+ <li><p>One working week between notification arriving at security@xen
+ and the issue of our own advisory to our predisclosure list. We
+ will use this time to gather information and prepare our
+ advisory, including required patches.</p></li>
+ <li><p>Two working weeks between issue of our advisory to our
+ predisclosure list and publication.</p></li>
+ </ol>
+ <p>When a discoverer reports a problem to us and requests longer delays than
+ we would consider ideal, we will honour such a request if reasonable. If a
+ discoverer wants an accelerated disclosure compared to what we would prefer,
+ we naturally do not have the power to insist that a discoverer waits for us
+ to be ready and will honour the date specified by the discoverer.</p>
+ <p>Naturally, if a vulnerability is being exploited in the wild we will make
+ immediately public release of the advisory and patch(es) and expect others
+ to do likewise.</p>
+
+ <h2>Pre-disclosure list</h2>
+ <p>Xen.org operates a pre-disclosure list. This list contains the email
+ addresses (ideally, role addresses) of the security response teams for
+ significant Xen operators and distributors.</p>
+ <p>This includes:<ul>
+ <li>Large-scale hosting providers;</li>
+ <li>Large-scale organisational users of Xen;</li>
+ <li>Vendors of widely-deployed Xen-based systems;</li>
+ <li>Distributors of widely-deployed operating systems with Xen support.</li>
+ </ul></p>
+ <p>This includes both corporations and community institutions.</p>
+ <p>Here as a rule of thumb "large scale" and "widely deployed" means an
+ installed base of 300,000 or more Xen guests; other well-established
+ organisations with a mature security response process will be considered on
+ a case-by-case basis.</p>
+ <p>The list of entities on the pre-disclosure list is public. (Just the list
+ of projects and organisations, not the actual email addresses.)</p>
+ <p>Pre-disclosure list members are expected to maintain the confidentiality
+ of the vulnerability up to the embargo date which security@xen have agreed
+ with the discoverer.</p>
+ <p>Specifically, prior to the embargo date, pre-disclosure list members
+ should not make available, even to their own customers and partners:<ul>
+ <li>the Xen.org advisory</li>
+ <li>their own advisory</li>
+ <li>revision control commits which are a fix for the problem</li>
+ <li>patched software (even in binary form) without prior consultation with security@xen and/or the discoverer.</li>
+ </ul></p>
+ <p>Organisations who meet the criteria should contact security@xen if they wish to receive pre-disclosure of advisories.</p>
+ <p>The pre-disclosure list will also receive copies of public advisories when they are first issued or updated.</p>
+
+ <h3>Organizations on the pre-disclosure list:</h3>
+ <p>This is a list of organisations on the pre-disclosure list
+ (not email addresses or internal business groups).
+ <ul><li>Amazon</li>
+ <li>Citrix</li>
+ <li>Debian</li>
+ <li>Intel</li>
+ <li>Linode</li>
+ <li>Novell</li>
+ <li>Oracle</li>
+ <li>Rackspace</li>
+ <li>Redhat</li>
+ <li>SuSE</li>
+ <li>Ubuntu</li>
+ <li>Xen.org security response team</li>
+ <li>Xen 3.4 stable tree maintainer</li>
+ </ul></p>
+
+ <h2>Change History</h2>
+ <ul>
+ <li><b>v1.2 Apr 2012:</b> Added pre-disclosure list</li>
+ <li><b>v1.1 Feb 2012:</b> Added link to Security Announcements wiki page</li>
+ <li><b>v1.0 Dec 2011:</b> Intial document published after review</li>
+ </ul>
+
+ </td>
+ <td width="10"></td>
+ </tr>
+
+ </table>
+ <!-- end callout -->
+
+ <td> </td>
+ </tr>
+ <tr>
+ <td class="corner_bl"> </td>
+ <td class="corner_br"> </td>
+ </tr>
+</table>
+
+
+<table border="0" cellpadding="0" cellspacing="0" align="center" id="xen_indexTable">
+ <tr><td>
+ <table class="copyright">
+ <tr valign="top" align="left">
+ <!-- Menu -->
+ <td width="2%"> </td>
+ <td width="15%">
+ <p><b>News:</b><br>
+ <a href="http://xen.org/news/press.html">Press Releases</a><br>
+ <a href="http://blog.xen.org/">Blog</a></p>
+ </td>
+ <td width="1%"> </td>
+ <td width="15%"><p><b>Resources:</b><br>
+ <a href="http://wiki.xen.org">Wiki</a><br>
+ <a href="http://xenbits.xen.org/">Sources</a><br>
+ <a href="http://www.xen.org/products/downloads.html">Downloads</a><br>
+ <a href="http://www.xen.org/projects/governance.html">Governance</a><br>
+ <a href="http://www.xen.org/projects/security_vulnerability_process.html">Security Information</a></p>
+ </td>
+ <td width="1%"> </td>
+ <td width="15%"><p><b>Connect:</b><br>
+ <a href="http://lists.xen.org/">Mailing Lists</a><br>
+ <a href="http://xen.markmail.org">Search Mailing Lists</a><br>
+ <a href="http://www.xen.org/community/irc.html">IRC</a><br>
+ <a href="http://twitter.com/xen_com_mgr">Twitter</a><br>
+ <a href="http://www.linkedin.com/groups?home=&gid=167190">LinkedIn</a></p>
+ </td>
+ <td width="1%"> </td>
+ <td width="15%"><p><b>Miscellaneous:</b><br>
+ <a href="mailto://community.manager@xen.org">Contact us</a><br>
+ <a href="http://xen.org/community/trademark.html">Legal and Privacy</a><br>
+ <a href="http://xen.org/community/logos.html">Trademark and Logos</a><br>
+ <a href="http://www.cafepress.co.uk/xen_org">Merchandise</a><br>
+ <a href="http://xen.org/community/jobs.html">Jobs in the Community</a></p>
+ </td>
+ <td width="50%"> </td>
+ </tr>
+ </table>
+ </td></tr>
+ <tr>
+ <td class="corner_vbl"> </td>
+ <td class="corner_vbr"> </td>
+ </tr>
+</table>
+
+<!-- Copyright -->
+<table cellpadding="0" align="center" width="895px">
+ <tr valign="center">
+ <td class="copyright">
+ <p>Copyright
+ <script language="JavaScript">
+ <!--
+ document.write(" 2005-");
+ today=new Date();
+ year0=today.getFullYear();
+ document.write(year0);
+ //-->
+ </script>
+ <noscript>
+ ©
+ </noscript><br>
+ Citrix Systems, Inc. All rights reserved. </p>
+ </td>
+ <td align="right"><img src="/images/globals/Citrix_Logo.png" alt="Citrix" width="90"></td>
+ </tr>
+</table>
+
+<!-- Hosting -->
+<table cellpadding="0" align="center" width="915px">
+ <tr><td><hr></td></tr>
+</table>
+<table cellpadding="0" align="center" width="895px">
+ <tr valign="top">
+ <td width="70px"><img src="/images/globals/Rackspace_Logo_Small.png" alt="Rackspace"></td>
+ <td class="copyright">
+ <p>Xen.org's servers are hosted with <a href="http://www.rackspace.com/">RackSpace</a>, monitoring our<br>
+ servers 24x7x365 and backed by RackSpace's Fanatical Support®.</p>
+ </td>
+ </tr>
+</table>
+
+
+<!-- Asynchronous tracking code introduced in Q1 2011 -->
+<script type="text/javascript">
+ var _gaq = _gaq || [];
+ _gaq.push(['_setAccount', 'UA-21816382-1']);
+ _gaq.push(['_setDomainName', '.xen.org']);
+ _gaq.push(['_trackPageview']);
+
+ (function() {
+ var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true;
+ ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js';
+ var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);
+ })();
+</script></body>
+</html>