-
Notifications
You must be signed in to change notification settings - Fork 9
State how to report security and privacy vulnerabilities. #13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
charter.html
Outdated
| repository stating that you'd like to report a vulnerability, but | ||
| without describing the vulnerability. The <a href=#editors>Editors</a> | ||
| and <a href=#chairs>Chairs</a> will then solicit details of the | ||
| vulnerability from you privately. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is it possible to configure an issue tracker so that it is a "drop box", where anyone may file issues but issues are not publicly visible? That would be more convenient. Alternately, an email alias would be good. I think this multi-step process doesn't well align with how security and privacy researchers prefer to work.
Also not explained here: how the vulnerability will be reported to projects/vendors affected. Should that be spelled out? At the very least there needs to be a way for vendors to provide a point of contact to the chairs.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@othermaciej wrote:
Is it possible to configure an issue tracker so that it is a "drop box", where anyone may file issues but issues are not publicly visible? That would be more convenient.
I agree that would be more convenient. AFAICT it's not possible on GitHub.
Alternately, an email alias would be good.
That's a good idea. @wseltzer, is that something we could set up?
I think this multi-step process doesn't well align with how security and privacy researchers prefer to work.
Yeah, I agree. Do you think the text in https://github.com/privacycg/.github/blob/master/SECURITY.md is better?
Also not explained here: how the vulnerability will be reported to projects/vendors affected. Should that be spelled out? At the very least there needs to be a way for vendors to provide a point of contact to the chairs.
Good point. Thoughts, @TanviHacks & @erik-anderson?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
An @w3 email would tend to come with an archive, but that could be set to team+chairs confidentiality
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I agree with Maciej that we should make the reporting process as simple as possible. Vulnerabilities can be emailed to a w3 email address that is confidential and restricted. Chairs and/or w3c staff can then alert the appropriate spec editors and/or browser vendors vulnerable in some designated amount of time. We can also add some text about giving credit to the reporter when the issue is publicly disclosed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pointing to the SECURITY.md would be great. We should update that when we refine the process, e.g. a W3 email alias.
…e chairs to define it and to keep it updated.
|
Okay, I've updated this PR to simply reference https://github.com/privacycg/.github/blob/master/SECURITY.md instead of defining the policy here. Please re-review! |
This is my attempt at addressing #12.