Re: Call for Community Feedback: Guidance on Reporting Protocol Vulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks, Roman.  I appreciate the work.  Please take all of these as suggestions for your consideration, and nothing more (e.g., I’m not pounding my shoe on the table).

My thinking is this:

Detailed guidance to navigate the disclosure of and remediate of vulnerabilities in the IETF is documented below.

… combined with The Fully Monty below might still leave security researchers with the feel that the onus is on them to drive a process that they may see as daunting.  It is only their responsibility if they wish to take it on.  They may find that it’s easier to talk to a C-Net reporter instead, and then have someone else pick up the work and go through our process if they wish, or not.

The solution for this is probably simple enough: a slight tonal change and a click.  That is:

Click <here> if you would like to see the full explanation of the process for disclosure and remediation of vulnerabilities.

That gives them a choice in terms of how far down the rabbit hole they want to go with us, but makes clear that there is at least a reporting path if they want to start slowly.

A few other comments:

The scope paragraphs are overly complex.  They can be reduced to the following:

You can use this disclosure policy to report vulnerabilities in our protocols and technical specifications that you find in either RFCs or our working documents, Internet-Drafts (I-Ds).  You should report specific implementation vulnerabilities to their maintainers, and not to us.  If you spot a vulnerability on our web site or tools, click <here> to report it, and it will be reviewed by the appropriate tooling team.

If you feel more comfortable putting this in passive, that’s a stylistic thing.  I’m an informal guy.

The section title, “Expectations from the IETF” doesn’t quite seem right.  “From” doesn’t usually follow “Expectations”, and the writing below doesn’t make a correction obvious.  I won’t claim to be the world’s best grammarian, but perhaps that’s worth a quick review.

Thanks again for getting this done.

Eliot

On 6 Nov 2020, at 03:45, Roman Danyliw <rdd@xxxxxxxx> wrote:

Hi Eliot!
 
Merging additional feedback on the executive summary and going for even more simplicity on the process so that the catch-all alias can be mentioned quickly, see the following:
 
 
Roman
 
From: Roman Danyliw 
Sent: Wednesday, October 28, 2020 10:53 AM
To: 'Eliot Lear' <lear@xxxxxxxxx>
Cc: The IETF List <ietf@xxxxxxxx>
Subject: RE: Call for Community Feedback: Guidance on Reporting Protocol Vulnerabilities
 
Hi Eliot!
 
From: Eliot Lear <lear@xxxxxxxxx> 
Sent: Wednesday, October 28, 2020 6:34 AM
To: Roman Danyliw <rdd@xxxxxxxx>
Cc: The IETF List <ietf@xxxxxxxx>
Subject: Re: Call for Community Feedback: Guidance on Reporting Protocol Vulnerabilities
 
Hi Roman,

 

On 27 Oct 2020, at 20:06, Roman Danyliw <rdd@xxxxxxxx> wrote:
 
Hi Eliot!
 
[Roman] In my view, the proposed text effectively says “this is the IETF process and as a last resort, please use the catch all alias”.  My read of your tighter text is the opposite, “here is a new reporting  alias, consider also getting involved in the IETF processes”.  Put in another way, we are actively steering away from established processes (e.g., using the mailing lists) and preferring the triage alias as the first step.  With the reduced text, we are not longer explaining “all the usual processes”.
 
 
Ok, Here’s a slightly tweaked version of that text to address how you read the doc:
 
 
If you believe you’ve discovered a protocol vulnerability, we very much welcome your contribution.  
You are also invited to take your findings to any open IETF working group or mailing list that you believe would be appropriate, in order to discuss protocol improvements to address any vulnerabilities.  If you do not know which IETF working group or mailing list to use or otherwise need help with our processes, we invite you to email “protocol-vulnerability@xxxxxxxx” as well as the document authors, and we will assist you.  All of our work is public, and therefore, disclosing to a working group or mailing list is public.  In some cases, we may ask you to file an erratum, and we will be happy to guide you through that process.
 
 
Again, fewer words are better.  And again, adding a few sentences about expectations is just fine.  This should make clear that the mailing list is intended to provide assistance, not triage, and it is entirely optional.
 
Does that make it clearer that we’re not gate keeping?
 
[Roman] Indeed it does.  I’d recommend a bit more wordsmithing based on the other feedback provided on payment and inclusion, but the substance is there for me.  Let me get the text into github so edits are easier to manage.
 
[Roman] To check that we’re on the same page, I see a future version of text like this as the up-front summary.  I believe we still need the existing detailed text to describe the detail process by which to engage the IETF (alluded to in this style of summary).  Agreed?
 
Regards,
Roman
 
Eliot
 
Eliot


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux