Git Product home page Git Product logo

security-disclosure's Introduction

Guidelines for Security Disclosures

security-disclosure's People

Contributors

plehegar avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Forkers

isabella232

security-disclosure's Issues

Extend scope to include access service providers

It would be good to extend the scope of this document to include providers of alternate formats and/or accommodations for disabled people, where the original content producers have failed to do so.

Proposal to hit 'reset' button on 'Security Disclosure' Process

'm going to point out that this "W3C Security Disclosures Best Practices" document has had, to my knowledge, no endorsement from W3C members on either side of the debate. Worse, it could be considered a fig-leaf to cover up W3C's inaction on DRM. At best, it's a well-meaning waste of time.

First, all companies of any reasonable size already have a security disclosure guidelines. Second, those that don't probably won't copy this draft document. Third, the entire process is misguided, ignoring the EFF covenant supported by adding more restraints to the security research community, rather than less as entailed by the EFF covenant. The likely cause of this procedural error by W3C. Therefore, I (formally, if possible) object to this entire "Security Disclosure" process.

Instead of continuing this bizarre "Security Disclosure" process, I propose this process be ended and W3C convene an ACTUAL NEUTRAL GROUP OF EXPERTS from the security research community, W3C membership, and with speciality in international law around copyright and security in order to solve this problem.

The goal of this group of experts should be to determine what the precise legal objections to the EFF covenant are, and if the concerns of the security research community and goals of the EFF covenant can be made part of the security disclosure policy of every member of the W3C involved in Encrypted Media Extensions and DRM. This may, and likely will, require substantial changes to the ALREADY EXISTING security disclosure process of existing W3C members like Mozilla, Google, and Microsoft.

Wendy Seltzer as she is the only person on W3C Team qualified to lead such a process for the benefit of both industry and users. As a lawyer who is knowledgeable about security/privacy and has dealt with the DMCA in court, she's best positioned to help out with this effort. Neither W3C staff member PLH, W3C PR, and even the Director have enough background in security and the law to reasonably make decisions around security disclosures and EME, but should pass the decision entirely over to a group of experts from the security and legal community while remaining neutral.

This process can address real concerns around jurisdictions, fair use, and sandboxing. This NEW process should be initiated and completed BEFORE W3C lets Encrypted Media Extensions be a recommendation. This was my initial understanding of objections against the EFF covenant from vendors before I left W3C over this DRM issue, i.e. that their lawyers could not accept EFF's covenant in its current form for some yet unclear reason but could imagine making changes to their current processes to bring their existing approved disclosure process in line with the EFF covenant's goal of not persecuting researchers under the DMCA. How after I left the W3C misinterpreted this feedback and started this security disclosure process is beyond me.

I am not going to claim I am qualified to decide on this issue either. However, the W3C should at least gather concerned experts and do a good faith effort to work out the concerns raised by many W3C members. This current effort is clearly not working and may not even be in good faith due the fact that's it's not even staffed with qualified people, including W3C lawyers Wendy and Rigo. The HME Working Group and this "Security Disclosure" process do not include any lawyers, either from members or the groups concerned around EME - and security research community, civil society, and even democratically elected leaders about how DRM could cause concrete damage and harm to users.

SSRF to Internal Port scanning in w3.org !

Hi,
I am Febin, a security researcher and a bug hunter. I found a Server-Side Request Forgery (SSRF) bug which leads to internal port scanning. I don't know how to contact w3.org to report the bug!!

Kindly Contact me for more details and PoC : [email protected]

Thank You!!

Legal threats can be counterproductive. Include a policy for outgoing security disclosures.

Under section 2. W3C Security Disclosure and Privacy Best Practices, there is text that threatens legal action if the finder does not disclose the issue in a certain way.

Such a threat can be counterproductive. While this document seems to have been written with security researchers disclosing to an organization in mind, try to read the conditions listed as a
technology vendor disclosing an issue to this organization (usually through security advisories or alerts which also also security disclosures!):

Request that you give us a reasonable time (usually not to exceed 90 days) before publicly disclosing specific details of the vulnerability;

For example if this organization is using Apache Struts2, would it be taking legal
action against Apache for disclosing a critical vulnerability without giving them 90 days to apply patches?

Request to be provided an appropriate level of detail on the vulnerability to allow us to identify and reproduce the issue. Detail should include target URLs, request/response pairs, screenshots, and/or other relevant information;

Most technology vendors provide enough details to identify issues in their advisories, but do not share reproducers or exploits. If the organization is using a Name-brand Webserver, would it be taking legal action against that Name-brand vendor for not disclosing exploits such as request/response pairs that trigger a vulnerability?

Request that your vulnerability research not create service disruption (e.g. DoS), privacy issues (i.e. accessing a customer’s data), or data destruction, within a reasonable effort.

This is perhaps the hardest to guarantee for any disclosure either for a finder or a tech vendor disclosing thru advisories. As we have seen with Mirai, vulnerabilities and their disclosures in one product (IP cams) can have an impact on something entirely different (Dyn).

Would an organization expecting finders and researchers to adhere to certain rules follow the same rules when it has to disclose vulnerabilities to its customers or users or other organizations?

IMHO:

  1. get rid of the legal threat for incoming security disclosures.
  2. include a policy template for outgoing security disclosures.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.