On Thursday, January 08, 2015 11:14:40 AM Andrew Kampjes wrote:
> Include more specific GPG recomendation usage.
> Add generalised rules for vulnerabilties.
> 
> Signed-off-by: Andrew Kampjes <a.kamp...@gmail.com>
> ---
>  SECURITY.md | 41 +++++++++++++++++++++++++++++------------
>  1 file changed, 29 insertions(+), 12 deletions(-)
> 
> diff --git a/SECURITY.md b/SECURITY.md
> index d558d44..c85e594 100644
> --- a/SECURITY.md
> +++ b/SECURITY.md
> @@ -23,25 +23,33 @@ What is a vulnerability?
>  ------------------------
>  
>  All vulnerabilities are bugs, but not every bug is a vulnerability.
> +Vulnerabilites compromise one or more of:
> +
> +    * Confidentiality (Personal and company data/secrets).
> +    * Integrity (trustworthyness and correctness).
> +    * Availability (Uptime and service).
> +
>  Here are some examples of vulnerabilities to which one would expect to
>  apply this process:
>  
> -    * A crafted packet that causes a kernel or userspace crash.
> +    * A crafted packet that causes a kernel or userspace crash
> +      (Availability).
>  
>      * A flow translation bug that misforwards traffic in a way likely
> -      to hop over security boundaries.
> +      to hop over security boundaries (Integrity).
>  
>      * An OpenFlow protocol bug that allows a controller to read
> -      arbitrary files from the file system.
> +      arbitrary files from the file system (Confidentiality).
>  
>      * Misuse of the OpenSSL library that allows bypassing certificate
> -      checks.
> +      checks (Integrity).
>  
>      * A bug (memory corruption, overflow, ...) that allows one to
>        modify the behaviour of OVS through external configuration
> -      interfaces such as OVSDB.
> +      interfaces such as OVSDB (Integrity).
>  
> -    * Privileged information is exposed to unprivileged users.
> +    * Privileged information is exposed to unprivileged users
> +      (Confidentiality).
>  
>  If in doubt, please do use the vulnerability management process.  At
>  worst, the response will be to report the bug through the usual
> @@ -53,8 +61,17 @@ Step 1: Reception
>  
>  To report an Open vSwitch vulnerability, send an email to the
>  ovs-security mailing list (see "Contact" at the end of this document).
> -A security team member should reply to the reporter acknowledging that
> -the report has been received.
> +A security team member should reply to the reporter within 24 hours
> +acknowledging that the report has been received.

There is no on-call team as far as know.  Perhaps Ben can confirm that.
So issues reported during holidays or weekends may take more than
24 hours to get a reply.  My concern here is that it will create a non
practical expectation.

Perhaps something like this:
A security team member should reply to the reporter within 24 hours
on business days acknowledging that the report has been received.

> +Reporters may ask for a GPG key while initiating contact with the
> +security team to deliver more sensitive reports.
> +If the reporter has used GPG while disclosing, further vulnerability
> +details should also be discussed using GPG.
> +
> +Please don't report security vulnerabilities to the ovs-dev list,
> +ovs-bug list or github issues to allow the team ovs security team
> +to responsibly fix the vulnerability.

It looks more clear/effective to me if we swap the two
paragraphs.  I mean, first tell to not report on ovs-dev and
then talk about GPG details...  

fbl

>  Please consider reporting the information mentioned in
>  REPORTING-BUGS.md, where relevant.
> @@ -132,11 +149,11 @@ vSwitch user who is interested and can be considered 
> trustworthy
>  enough could be included.  To become a downstream stakeholder, email
>  the ovs-security mailing list.
>  
> -If the vulnerability is public, skip this step.
> +If the vulnerability is already public, skip this step.
>  
>  
> -Step 5: Full Disclosure
> ------------------------
> +Step 5: Public Disclosure
> +-------------------------
>  
>  When the embargo expires, push the (reviewed) patches to appropriate
>  branches, post the patches to the ovs-dev mailing list (noting that
> @@ -151,7 +168,7 @@ The security advisory should be GPG-signed by a security 
> team member
>  with a key that is in a public web of trust.
>  
>  
> -Contact 
> +Contact
>  =======
>  
>  Report security vulnerabilities to the ovs-security mailing list:
> 

_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to