-
Notifications
You must be signed in to change notification settings - Fork 9
RFC00003 First version of a vulnerability disclosure policy #19
RFC00003 First version of a vulnerability disclosure policy #19
Conversation
keybase nowadays provides public links to chat. |
|
||
In other words: | ||
- We want: | ||
- to encourage reporting of security issues (ie: “attack us!”) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not entirely happy about "attack us!". Maybe ("please let us know about vulnerabilities!")
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I liked the idea of putting the same idea in more abstract terms and in more direct terms, which we have used out loud (hence the quotation marks). However, i agree that there must be a nice way to put it than just "attack us!".
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
heard from the security team for the past five days, there are a few steps you | ||
can take (in order): | ||
- Contact the current security coordinator (Nathaniel McCallum (public key)) directly. | ||
- Contact the back-up contact (Mike Bursell (public key)) directly. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have to decide if we're going to maintain public keys. Neither @npmccallum nor I currently does.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is one of the big questions this document raises.
I'm warming up more and more to the idea of treating email like public channel, and using it (or the chat) to set up more secure communication channels. The question then becomes: what communication channel do we set up?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does Zulip have a way of managing this, by any chance?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure if this is exactly what you're looking for, but Zulip supports sending an email to a (private?) stream.
I am not sure if it's bidirectional though, so if the Enarx security council maintains a private stream and they receive a vulnerability disclosure, I am not sure if their responses into the stream will be relayed back by email to the security researcher.
I don't have enough data to know if Zulip is an appropriate place for this in terms of security and privacy.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's a neat Zulip function, thanks for pointing it out. However documentation says nothing about PGP-encrypted email. This means that the email would be unencrypted until it reaches the Zulip server, at which point it's private (but not E2E-encrypted, as the Zulip server is able to relay the content of the email clearly to the stream). Furthermore, replies to the stream to the initial sender would also be unencrypted, as the Zulip server would not know which public PGP key to encrypt it to. So while cool, this is not really an option for us i fear.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggest we close the Zulip thread here, as we've gone with Rocket.
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
|
||
In light of this: | ||
- Can we *not* offer email as a way communication channel while remaining | ||
universal enough to allow everyone to report security issues in Enarx? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm now in contact with someone from the Github org to find out if there's something that they're working on that we could use (and the creation of which we could be help with).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That is excellent and would probably be a superior way to do this, if the feature is done right.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Initial review.
In light of this: | ||
- Can we *not* offer email as a way communication channel while remaining | ||
universal enough to allow everyone to report security issues in Enarx? | ||
- Should we treat email as a public channel, similar to our chat? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's a distinction, but we should be careful.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A distinction in nature or in risk?
At the end of the day, i believe more and more strongly that we should treat email as a public channel, at least in terms of anything that might need confidentiality. It may not be entirely technically true, but it fosters the right attitude towards the levels of privacy and confidentiality one can expect from email overall.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agreed.
@axelsimon The PR being numbered #19 is because issues also count towards numbering. We've filed ~15 issues and 4 PRs, so this ends up being #19. |
Makes sense. Thanks Mark. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks pretty good! I suggested a few changes. Also I assume we will work out what (non-email) channel to use for this before the RFC is approved, so I left that alone despite it being an outstanding issue.
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have two ideas for this, detailed below. Interested in others' thoughts.
...erability_disclosure_and_embargo_policy/00004-Vulnerability_disclosure_and_embargo_policy.md
Outdated
Show resolved
Hide resolved
locally pending the announcement. | ||
5. On the embargo date, an announcement is sent to Enarx public channels | ||
(chat, website). The changes are pushed to the public repository and new | ||
builds are deployed. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it would be a good idea to specify that code changes get pushed to the repo and built before any embargo press lands. This would allow two things:
- for us to directly specify the commit/version that patches the vulnerability in the press release, if we want (perhaps this is another thing we want to enforce?);
- for people reading the disclosure to be able to migrate to that version immediately upon reading about it. We don't want them to come to our repo only to find that it's still building and won't be available for some period of time.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good points. Incorporating them.
aceb9d1
to
da60893
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This looks reasonable to me. I've included a question inline, but one that doesn't necessarily imply any changes.
From then, we will establish a more secure area where the issue can be | ||
discussed, in the form of a | ||
[Github Security Advisory](https://help.github.com/en/github/managing-security-vulnerabilities/about-github-security-advisories). | ||
|
||
You will be invited to join this private area to discuss specifics. Doing so | ||
allows us to start with a high level of confidentiality and relax it if the | ||
issue is less critical, moving to work on the fix in the open. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we have any desire to call out end-to-end encrypted Rocket.Chat as an option here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's mentioned at the end in the future ideas. The RFC is only in "proposed" state, so let's leave it as is for now, but i like the idea, and we may want to make it more explicit to use OTR when using Rocket Chat to inform the team of a possible security issue.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
As well as a description of our approach to embargoes, and a first draft of a Enarx Security Advisories page. Open to debate and improvement.
Co-Authored-By: Mike Bursell <[email protected]> Co-authored-by: Lily Sturmann <[email protected]> Co-authored-by: blazebissar <[email protected]>
19ce41e
to
64d903c
Compare
- Final tweaks and typo corrections - Move vuln disclosure RFC directory to root of RFC directory (we have done away with the "concepts" etc. directories)
64d903c
to
4df252c
Compare
…as well as a description of our approach to embargoes + a first draft of an Enarx Security Advisories page.
Comments and improvements most welcome.
Closes #18.