]> xenbits.xensource.com Git - people/larsk/security-process.git/log
people/larsk/security-process.git
10 years agoReformat to align with web version: newlines before <p>
Ian Jackson [Fri, 16 Jan 2015 17:44:47 +0000 (17:44 +0000)]
Reformat to align with web version: newlines before <p>

perl -0 -i~ -pe 's/(?<!\n)(\<p\>)/\n$1/g' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Replace <b> with <strong>
Ian Jackson [Fri, 16 Jan 2015 17:39:07 +0000 (17:39 +0000)]
Reformat to align with web version: Replace <b> with <strong>

perl -i~ -pe 's{\<(/?)b\>}{<$1strong>}g' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Remove header/trailer
Ian Jackson [Fri, 16 Jan 2015 17:36:23 +0000 (17:36 +0000)]
Reformat to align with web version: Remove header/trailer

The CMS generates these; they aren't in the source for the individual
page on the website as c&p from the edit box.

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Remove newlines
Ian Jackson [Fri, 16 Jan 2015 17:34:21 +0000 (17:34 +0000)]
Reformat to align with web version: Remove newlines

perl -0 -i~ -pe 's/\n(?!\<)/ /g' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Remove whitespace
Ian Jackson [Fri, 16 Jan 2015 17:31:23 +0000 (17:31 +0000)]
Reformat to align with web version: Remove whitespace

perl -i~ -pe 's/^\s+//' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
12 years agoExpand eligibility for the pre-disclosure list
George Dunlap [Thu, 15 Nov 2012 16:15:19 +0000 (16:15 +0000)]
Expand eligibility for the pre-disclosure list

As discussed on the xen-devel mailing list, expand eligibility of the
pre-disclosure list to include any public hosting provider, as well
as software project:
* Change "Large hosting providers" to "Public hosting providers"
* Remove "widely-deployed" from vendors and distributors
* Add rules of thumb for what constitutes "genuine"
* Add an itemized list of information to be included in the application,
to make expectations clear and (hopefully) applications more streamlined.

The first will allow hosting providers of any size to join.

The second will allow software projects and vendors of any size to join.

The third and fourth will help describe exactly what criteria will be used to
determine eligibility for 1 and 2.

Additionally, this proposal adds the following requirements:
* Applicants and current members must use an e-mail alias, not an individual's
e-mail
* Applicants and current members must submit a statement saying that they have
read, understand, and will abide by this process document.

v4:
 - Make it clear that the organization is committing to respecting the
   secrecy, as well as committing to the secrecy of all members who are exposed
   to the information during the pre-disclosure period.
v3:
 - Organizations already on the list also must conform to requirements for
   a security alias and a statement saying they're read and will abide by
   the policy.
v2:
 - Include "genuine" software providers, and a rule of thumb for "genuine"
 - Include evidence for software providers
 - Allow "a key signed with a key in the PGP strong set" as evidence
 - Require applicants to state they have read and understand policy
   and will abide by it
 - Minor suggested clarifications
 - Added version message at bottom
 - Made security aliases a requirement

Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
12 years agoClean up minor inconsistency re public disclosure
George Dunlap [Thu, 15 Nov 2012 15:52:08 +0000 (15:52 +0000)]
Clean up minor inconsistency re public disclosure

Include a summary of both kinds of e-mail which may be sent to the
pre-disclosure list in the "Pre-disclosure list" section, before the
discussion of what is expected of pre-disclosure list members.  Also
make it consistently clear that the public disclosure will always be
sent to the pre-disclosure list.

Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
12 years agoDeclare version 1.3
Ian Campbell [Thu, 16 Aug 2012 15:12:05 +0000 (16:12 +0100)]
Declare version 1.3

12 years agoPatch review, expert advice and targetted fixes
Ian Campbell [Thu, 16 Aug 2012 15:05:01 +0000 (16:05 +0100)]
Patch review, expert advice and targetted fixes

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "Patch development and review"

12 years agoDiscuss post-embargo disclosure of potentially controversial private decisions
Ian Campbell [Thu, 16 Aug 2012 14:45:06 +0000 (15:45 +0100)]
Discuss post-embargo disclosure of potentially controversial private decisions

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "11. Transparency"

12 years agoClarify the scope of the process to just the hypervisor project
Ian Campbell [Thu, 16 Aug 2012 14:27:00 +0000 (15:27 +0100)]
Clarify the scope of the process to just the hypervisor project

Other projects are handled on a best effort basis by the project lead
with the assistance of the security team.

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "9. Vulnerability process scope"

12 years agoClarifications to predisclosure list subscription instructions
Ian Campbell [Thu, 16 Aug 2012 14:11:18 +0000 (15:11 +0100)]
Clarifications to predisclosure list subscription instructions

Specially:
  * Mention that subscriptions via the webterface do not work / are
    not honoured.
  * Mention the preference for role addresses only.

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "8. Predisclosure subscription process, and email address
        criteria"

12 years agoClarify what info predisclosure list members may share during an
Ian Campbell [Thu, 16 Aug 2012 14:04:43 +0000 (15:04 +0100)]
Clarify what info predisclosure list members may share during an
embargo

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
  "7. Public communications during the embargo period"

12 years agoBaseline version.
Ian Campbell [Thu, 16 Aug 2012 14:04:06 +0000 (15:04 +0100)]
Baseline version.

Downloaded from
http://www.xen.org/projects/security_vulnerability_process.html
at Thu Aug 16 15:04:25 BST 2012