Skip to content

Conversation

@hober
Copy link
Member

@hober hober commented Feb 12, 2020

This is my attempt at addressing #12.

@hober hober added do not merge This PR is a work in progress and is not ready to be merged charter labels Feb 12, 2020
@hober hober changed the title State how to report security and privacy vulnerabilities. Fixes #12. State how to report security and privacy vulnerabilities. Feb 12, 2020
charter.html Outdated
repository stating that you'd like to report a vulnerability, but
without describing the vulnerability. The <a href=#editors>Editors</a>
and <a href=#chairs>Chairs</a> will then solicit details of the
vulnerability from you privately.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it possible to configure an issue tracker so that it is a "drop box", where anyone may file issues but issues are not publicly visible? That would be more convenient. Alternately, an email alias would be good. I think this multi-step process doesn't well align with how security and privacy researchers prefer to work.

Also not explained here: how the vulnerability will be reported to projects/vendors affected. Should that be spelled out? At the very least there needs to be a way for vendors to provide a point of contact to the chairs.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@othermaciej wrote:

Is it possible to configure an issue tracker so that it is a "drop box", where anyone may file issues but issues are not publicly visible? That would be more convenient.

I agree that would be more convenient. AFAICT it's not possible on GitHub.

Alternately, an email alias would be good.

That's a good idea. @wseltzer, is that something we could set up?

I think this multi-step process doesn't well align with how security and privacy researchers prefer to work.

Yeah, I agree. Do you think the text in https://github.com/privacycg/.github/blob/master/SECURITY.md is better?

Also not explained here: how the vulnerability will be reported to projects/vendors affected. Should that be spelled out? At the very least there needs to be a way for vendors to provide a point of contact to the chairs.

Good point. Thoughts, @TanviHacks & @erik-anderson?

Copy link

@wseltzer wseltzer Feb 23, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

An @w3 email would tend to come with an archive, but that could be set to team+chairs confidentiality

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with Maciej that we should make the reporting process as simple as possible. Vulnerabilities can be emailed to a w3 email address that is confidential and restricted. Chairs and/or w3c staff can then alert the appropriate spec editors and/or browser vendors vulnerable in some designated amount of time. We can also add some text about giving credit to the reporter when the issue is publicly disclosed.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pointing to the SECURITY.md would be great. We should update that when we refine the process, e.g. a W3 email alias.

…e chairs to define it and to keep it updated.
@hober
Copy link
Member Author

hober commented Mar 16, 2020

Okay, I've updated this PR to simply reference https://github.com/privacycg/.github/blob/master/SECURITY.md instead of defining the policy here. Please re-review!

@hober hober merged commit 4fccf55 into master Mar 18, 2020
@hober hober deleted the issue-12 branch March 18, 2020 18:43
@hober hober removed the do not merge This PR is a work in progress and is not ready to be merged label Mar 18, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants