So the way that I would see this working, is the security team would have
upto maybe 4 people on it.

If a researcher just sends the report in the clear to the list, all good,
just keep discussing on the list in plaintext.
If a researcher requests GPG encryption, then someone from the list would
send them a pubkey and the researcher would send back the details encrypted.

The initial point of contact on the security team can then forward the
details onto the other members of the security team (there aren't many of
them), enigmail thunderbird extension, which I assume most people use for
doing GPG on email encrypt and send to multiple recipients.

You are correct, mailing lists often break GPG if they're not configured
correctly. I think that the simplest approach is to move the encrypted
conversations off the security list when there are only 4ish members.
In that case, the security@ovs list is mostly just to pick up the initial
reports.


On Sat Jan 10 2015 at 05:05:42 Ben Pfaff <b...@nicira.com> wrote:

> On Fri, Jan 09, 2015 at 10:44:20AM +1300, Andrew Kampjes wrote:
> > +Reporters may ask for a GPG key while initiating contact with the
> > +security team to deliver more sensitive reports.
> > +If the reporter has used GPG while disclosing, further vulnerability
> > +details should also be discussed using GPG.
>
> This is a nice idea but I do not see how it is practical.  How is a
> mailing list discussion conducted using GPG?
>
_______________________________________________
dev mailing list
dev@openvswitch.org
http://openvswitch.org/mailman/listinfo/dev

Reply via email to