Re: Call for Community Feedback: Guidance on Reporting Protocol Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Oct 26, 2020 at 11:58:33PM +0400, Loganaden Velvindron wrote:
>  There have been cases where security researchers feel that the
> organizations are taking too long and then they decide to publish full
> details including Proof of Concept. I think that the document should
> encourage researchers to wait before releasing full PoC until the
> proper errata has been published.

How do you even qualify vulnerabilities as something other than
 "text we could have added to the security considerations section, but
nobody thought the attack vector would be expoited" ?

Other question:

How do you decide between protocol and implemntation ? E.g.: the distinction
between IKEv2/ESP allows me to implement better defense against DoS with
advanced endpoint hardware. TLS does not have this. So ... implementation or
protocol issue ?

Toerless

> > This guidance will serve as a complement to the recently written IETF LLC infrastructure and protocol vulnerability disclosure statement [2].
> >
> > The IESG appreciates any input from the community on the proposed text and will consider all input received by November 7, 2020.
> >
> > Regards,
> > Roman
> > (for the IESG)
> >
> > [1] This guidance text would be added to a new URL at https://www.ietf.org/standards/rfcs/vulnerabilities, and then referenced from www.ietf.org/contact, https://www.ietf.org/standards/process/, https://www.ietf.org/standards/rfcs/, and https://www.ietf.org/topics/security/
> >
> > [2] https://www.ietf.org/about/administration/policies-procedures/vulnerability-disclosure
> >
> >

-- 
---
tte@xxxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux