]> xenbits.xensource.com Git - people/iwj/security-process.git/log
people/iwj/security-process.git
8 years agogovernance.html: from Lars (retry) master
Ian Jackson [Fri, 8 Jul 2016 16:17:43 +0000 (17:17 +0100)]
governance.html: from Lars (retry)

8 years agogovernance.html: from Lars
Ian Jackson [Fri, 8 Jul 2016 15:45:39 +0000 (16:45 +0100)]
governance.html: from Lars

10 years agoRun "after-edit"
Ian Jackson [Mon, 2 Mar 2015 14:29:25 +0000 (14:29 +0000)]
Run "after-edit"

10 years agoDocument publication date
Ian Jackson [Mon, 2 Mar 2015 14:29:03 +0000 (14:29 +0000)]
Document publication date

10 years agoxen-security-issues-discuss: Document that it is not yet set up.
Ian Jackson [Mon, 2 Mar 2015 14:23:15 +0000 (14:23 +0000)]
xen-security-issues-discuss: Document that it is not yet set up.

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoDocument changes in changelog and heading rebasing
Ian Jackson [Fri, 16 Jan 2015 19:51:26 +0000 (19:51 +0000)]
Document changes in changelog and heading

IMPLEMENTATION TASKS:
 * Assign last change date to be approval date
 * Reformat html to web page CMS format
 * Update web page

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoClarify what announcements may be made by to service users
Ian Jackson [Fri, 16 Jan 2015 19:51:21 +0000 (19:51 +0000)]
Clarify what announcements may be made by to service users

Service provider list members should not be prevented from being
reasonably honest with their users.

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoClarify and fix prior consultation text
Ian Jackson [Fri, 16 Jan 2015 19:51:15 +0000 (19:51 +0000)]
Clarify and fix prior consultation text

The prior consultation clause should applies to all disclosure
exceptions.  The list end appears to have been moved by mistake.  So
put it back.

Also, no longer suggest that predisclosure list members should consult
with the discoverer, since the discoverer is not generally known to
predisclosure list members.

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoExplicitly permit within-list information sharing during embargo
Ian Jackson [Fri, 16 Jan 2015 19:51:11 +0000 (19:51 +0000)]
Explicitly permit within-list information sharing during embargo

Permitting sharing of embargoed fixes amongst predisclosure list
seemed to have appropriate consensus.

IMPLEMENTATION TASKS:
 * Send a notification to the existing predisclosure list members
   informing them that they have been subscribed to the new list.
   Notice should point them to the policy section on filtering
   by List-Id, and offer to unsubscribe them from both lists if
   they prefer.
 * Create the new mailing list, and
   - check that it can be emailed from outside
   - that messages are held for moderation and can be approved

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
---
v2: Obfuscate -discuss@ list's full email address with <dot>
    and <span>.

10 years agoTighten, and make more objective, predisclosure list application
Ian Jackson [Fri, 16 Jan 2015 19:51:03 +0000 (19:51 +0000)]
Tighten, and make more objective, predisclosure list application

Applicants should be required to:

  - Provide information on their public web pages which makes
    it clear that and why they are eligible;

  - Specifically, publicly state that and how they are using Xen
    (so that the Security Team can verify eligibility);

  - Provide a way for members of the public to responsibly report
    security problems to the applicant, just as the Xen Project does.

The Security Team should be forbidden from trying to hunt down
eligibility information etc. and should instead be mandated to reject
incomplete requests.

Also remove the "case-by-case-basis" membership exception.  This is
not consistent with the new objective membership application process.

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoUse a public mailing list for predisclosure membership applications.
Ian Jackson [Fri, 16 Jan 2015 19:50:56 +0000 (19:50 +0000)]
Use a public mailing list for predisclosure membership applications.

IMPLEMENTATION TASKS:
 * Create the mailing list (and check that it works from outside)

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
---
v2: Provide whole email address for predisclosure-applications@,
    but obfuscate it with <dot> and a <span>.
    Reword sentence about public mailing list as suggested by
    Ian Campbell.

10 years agoDeployment with Security Team Permission
Ian Jackson [Fri, 16 Jan 2015 19:50:49 +0000 (19:50 +0000)]
Deployment with Security Team Permission

Permitting deployment during embargo seemed to have rough consensus on
the principle.  We seemed to be converging on the idea that the
Security Team should explicitly set deployment restrictions for each
set of patches.

IMPLEMENTATION TASKS:
 * Add new section to Security Team's advisory template.
 * Add new section to any existing outstanding embargoed advisories.

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoAdd headings
Ian Jackson [Fri, 16 Jan 2015 19:50:35 +0000 (19:50 +0000)]
Add headings

 - For Predisclosure list application process
 - For Handling of embargoed information"

No semantic change.

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoGrammar fix: Remove a comma splice
Ian Jackson [Fri, 16 Jan 2015 19:50:04 +0000 (19:50 +0000)]
Grammar fix: Remove a comma splice

No semantic change.

Signed-off-by: Ian Jackson <ijackson@chiark.greenend.org.uk>
Signed-off-by: Ian Jackson <ian.jackson@eu.citrix.com>
10 years agoRun before-edit v2.7
Ian Jackson [Fri, 16 Jan 2015 17:58:19 +0000 (17:58 +0000)]
Run before-edit

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoConversion scripts
Ian Jackson [Fri, 16 Jan 2015 17:57:45 +0000 (17:57 +0000)]
Conversion scripts

To make editing in emacs, diffing, etc, easier.

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoAdd .gitignore
Ian Jackson [Fri, 16 Jan 2015 17:56:09 +0000 (17:56 +0000)]
Add .gitignore

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoRemove two double-spaces
Ian Jackson [Fri, 16 Jan 2015 17:55:31 +0000 (17:55 +0000)]
Remove two double-spaces

No semantic change.

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoImport of current website version
Ian Jackson [Fri, 16 Jan 2015 17:30:03 +0000 (17:30 +0000)]
Import of current website version

From email from Lars Kurth.

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: newlines before <p>
Ian Jackson [Fri, 16 Jan 2015 17:44:47 +0000 (17:44 +0000)]
Reformat to align with web version: newlines before <p>

perl -0 -i~ -pe 's/(?<!\n)(\<p\>)/\n$1/g' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Replace <b> with <strong>
Ian Jackson [Fri, 16 Jan 2015 17:39:07 +0000 (17:39 +0000)]
Reformat to align with web version: Replace <b> with <strong>

perl -i~ -pe 's{\<(/?)b\>}{<$1strong>}g' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Remove header/trailer
Ian Jackson [Fri, 16 Jan 2015 17:36:23 +0000 (17:36 +0000)]
Reformat to align with web version: Remove header/trailer

The CMS generates these; they aren't in the source for the individual
page on the website as c&p from the edit box.

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Remove newlines
Ian Jackson [Fri, 16 Jan 2015 17:34:21 +0000 (17:34 +0000)]
Reformat to align with web version: Remove newlines

perl -0 -i~ -pe 's/\n(?!\<)/ /g' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
10 years agoReformat to align with web version: Remove whitespace
Ian Jackson [Fri, 16 Jan 2015 17:31:23 +0000 (17:31 +0000)]
Reformat to align with web version: Remove whitespace

perl -i~ -pe 's/^\s+//' security_vulnerability_process.html

Signed-off-by: Ian Jackson <Ian.Jackson@eu.citrix.com>
12 years agoExpand eligibility for the pre-disclosure list
George Dunlap [Thu, 15 Nov 2012 16:15:19 +0000 (16:15 +0000)]
Expand eligibility for the pre-disclosure list

As discussed on the xen-devel mailing list, expand eligibility of the
pre-disclosure list to include any public hosting provider, as well
as software project:
* Change "Large hosting providers" to "Public hosting providers"
* Remove "widely-deployed" from vendors and distributors
* Add rules of thumb for what constitutes "genuine"
* Add an itemized list of information to be included in the application,
to make expectations clear and (hopefully) applications more streamlined.

The first will allow hosting providers of any size to join.

The second will allow software projects and vendors of any size to join.

The third and fourth will help describe exactly what criteria will be used to
determine eligibility for 1 and 2.

Additionally, this proposal adds the following requirements:
* Applicants and current members must use an e-mail alias, not an individual's
e-mail
* Applicants and current members must submit a statement saying that they have
read, understand, and will abide by this process document.

v4:
 - Make it clear that the organization is committing to respecting the
   secrecy, as well as committing to the secrecy of all members who are exposed
   to the information during the pre-disclosure period.
v3:
 - Organizations already on the list also must conform to requirements for
   a security alias and a statement saying they're read and will abide by
   the policy.
v2:
 - Include "genuine" software providers, and a rule of thumb for "genuine"
 - Include evidence for software providers
 - Allow "a key signed with a key in the PGP strong set" as evidence
 - Require applicants to state they have read and understand policy
   and will abide by it
 - Minor suggested clarifications
 - Added version message at bottom
 - Made security aliases a requirement

Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
12 years agoClean up minor inconsistency re public disclosure
George Dunlap [Thu, 15 Nov 2012 15:52:08 +0000 (15:52 +0000)]
Clean up minor inconsistency re public disclosure

Include a summary of both kinds of e-mail which may be sent to the
pre-disclosure list in the "Pre-disclosure list" section, before the
discussion of what is expected of pre-disclosure list members.  Also
make it consistently clear that the public disclosure will always be
sent to the pre-disclosure list.

Signed-off-by: George Dunlap <george.dunlap@eu.citrix.com>
12 years agoDeclare version 1.3
Ian Campbell [Thu, 16 Aug 2012 15:12:05 +0000 (16:12 +0100)]
Declare version 1.3

12 years agoPatch review, expert advice and targetted fixes
Ian Campbell [Thu, 16 Aug 2012 15:05:01 +0000 (16:05 +0100)]
Patch review, expert advice and targetted fixes

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "Patch development and review"

12 years agoDiscuss post-embargo disclosure of potentially controversial private decisions
Ian Campbell [Thu, 16 Aug 2012 14:45:06 +0000 (15:45 +0100)]
Discuss post-embargo disclosure of potentially controversial private decisions

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "11. Transparency"

12 years agoClarify the scope of the process to just the hypervisor project
Ian Campbell [Thu, 16 Aug 2012 14:27:00 +0000 (15:27 +0100)]
Clarify the scope of the process to just the hypervisor project

Other projects are handled on a best effort basis by the project lead
with the assistance of the security team.

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "9. Vulnerability process scope"

12 years agoClarifications to predisclosure list subscription instructions
Ian Campbell [Thu, 16 Aug 2012 14:11:18 +0000 (15:11 +0100)]
Clarifications to predisclosure list subscription instructions

Specially:
  * Mention that subscriptions via the webterface do not work / are
    not honoured.
  * Mention the preference for role addresses only.

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
    "8. Predisclosure subscription process, and email address
        criteria"

12 years agoClarify what info predisclosure list members may share during an
Ian Campbell [Thu, 16 Aug 2012 14:04:43 +0000 (15:04 +0100)]
Clarify what info predisclosure list members may share during an
embargo

See <20448.49637.38489.246434@mariner.uk.xensource.com>, section
  "7. Public communications during the embargo period"

12 years agoBaseline version.
Ian Campbell [Thu, 16 Aug 2012 14:04:06 +0000 (15:04 +0100)]
Baseline version.

Downloaded from
http://www.xen.org/projects/security_vulnerability_process.html
at Thu Aug 16 15:04:25 BST 2012