-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Decide security (issue) report handling team and procedure #60
Comments
This to also document the verbal agreement by @hartm and @dstebila in facilitating a "dry-run" security incident handling exercise with the team designated by way of resolving this issue. One goal of this is to get input regarding responsibilities of a maintainers and contributors in this regard. |
In case this group finds these resources useful for that discussion, the incident response file may be particularly helpful.
|
Thanks @TheFoxAtWork for the helpful resources! |
A few notes from the security response discussion of the November 5 TSC meeting:
|
This question goes to the heart of what OQS wants to be: A place where "the buck stops" (i.e., responsibility is taken to fix things unconditionally, e.g., via the patch mechanism) or whether it keeps passing the buck to the many upstreams. For the latter, OQS should have a clear classification of which upstreams are active (including getting clear ongoing upstream commitments to help with vulnerabilities at the same notice OQS may want to promise in its security policy) and those that are not. This classification would need to be clearly documented and utilized during incident handling. For the former, OQS IMO would need to change its modus operandi upside down: From "best effort research code aggregator" to "reliable crypto code supplier". I personally have strong reservations about this being possible in the current setup. Lastly, I'd like to re-iterate the thought stated a few months back:
|
Yes, that's still on my to-do list as an action item from the last TSC call. However, we had also said that we would write up a security procedure, and I think it would make sense to have the procedure in place to work through during the dry-run, which is why I haven't asked Ry to help us do a dry run yet. |
Here's a first attempt at a security procedure for OQS: #124 |
Currently only two OQS sub projects have publicly documented SECURITY.md handling procedures defined. The set of people receiving "privately" reported security vulnerabilities in those is pretty large (>10) as per open-quantum-safe/oqs-provider#451 (comment).
This issue is to codify and reduce this number to people explicitly agreeing and able to handle security incidents (e.g., a Vulnerability Management Team) and to decide whether other OQS sub projects should be subject to this procedure as well.
The text was updated successfully, but these errors were encountered: