Re: Call for Community Feedback: Guidance on Reporting Protocol Vulnerabilities

Eliot Lear <lear@cisco.com> Wed, 28 October 2020 20:22 UTC

Return-Path: <lear@cisco.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 738583A0A0B; Wed, 28 Oct 2020 13:22:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.6
X-Spam-Level:
X-Spam-Status: No, score=-9.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zV7QaqEh4lDs; Wed, 28 Oct 2020 13:22:20 -0700 (PDT)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8414C3A0A13; Wed, 28 Oct 2020 13:22:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6111; q=dns/txt; s=iport; t=1603916539; x=1605126139; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=vVDwzYNIRWtp9BIA75XQecPopzZRtoHcdJv31mGcWo8=; b=AG0iMq8O7ukcQIKcIGmBOzFvsNuN/HxX61SVdBP6EjaY1y4mLp3JufuD NJyndhFlztaMREvkhKCJxDifboaZO4E0moPC1CB/skUCD5qhz4lPLwXVQ raxqDe8OcFrW5YBJFw+QLVk9WO50cLTpH9BTj4CL9Dqj1PXkSfBKxIGcq c=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0CgBQDS0Zlf/xbLJq1gHgEBCxIMggQLgSOCTAEgEoRqiQWHaCaUC4YxgWkLAQEBDQEBLwQBAYRKAoIGJjcGDgIDAQELAQEFAQEBAgEGBG2FbYVzAQQBHQZWEAtCAgJXBieDEoJdIK03doEyhVeFCoE4jVSCAIE4DBCCTT6ECAESAYM4M4IsBLYRgXyCdYMYl2gDH5JFjxuwHYNfAgQGBQIVgWokZ3AzGggbFWUBgj89EhkNhj+WKkADaAIGAQkBAQMJjkgBAQ
X-IronPort-AV: E=Sophos; i="5.77,427,1596499200"; d="scan'208,217"; a="30706500"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 28 Oct 2020 20:22:15 +0000
Received: from [10.61.234.166] ([10.61.234.166]) by aer-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 09SKMEJt015024 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 28 Oct 2020 20:22:14 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <5D2EBCEA-A3E2-4989-AE19-FB48479660A3@cisco.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_77B19167-CF7B-4273-AE48-9E95ED4062A4"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
Subject: Re: Call for Community Feedback: Guidance on Reporting Protocol Vulnerabilities
Date: Wed, 28 Oct 2020 21:22:14 +0100
In-Reply-To: <D2833F4B-E1CF-473A-AD9A-07BAE4EE90F5@ietf.org>
Cc: Roman Danyliw <rdd@cert.org>, The IETF List <ietf@ietf.org>
To: Jay Daley <jay@ietf.org>
References: <5081794697df44d8bd76b675cf08dc23@cert.org> <09B0A1A1-6534-4A44-A162-9962FFF8D8B8@cisco.com> <362d68dd6117452f925322f8180de423@cert.org> <B864FFAE-3E3E-4CEF-B832-4552C8BAE70B@cisco.com> <28e48db9700d49dd97dc0023761a8906@cert.org> <0E4F9F37-6907-496F-BBCA-112FE6CA75FB@cisco.com> <D2833F4B-E1CF-473A-AD9A-07BAE4EE90F5@ietf.org>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
X-Outbound-SMTP-Client: 10.61.234.166, [10.61.234.166]
X-Outbound-Node: aer-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/Om6ATJjFg3jov9BOE7aXGC9mjFM>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Oct 2020 20:22:21 -0000

Hi Jay

> 
> To unpick this we need to consider the perspective of potential reporters and their different motivations:
> 
> 1.  People who already know the IETF will already know that they can contact the appropriate WG and/or authors and so don’t need to be told that.  If they don’t have a problem with that then there’s nothing to be done, but if they believe that this approach will not work then an alternate mechanism is needed.  The text above suggests that this is not an alternative mechanism, simply an issue routing support mechanism, and so is unlikely to address that need.

Our people have no need of any of this.  They understand our processes, and know how to maneuver them.  This document doesn’t really address them.

> 
> 2.  In my experience, vulnerability reporters who do not know the organisation they are reporting to want to know that the organisation commits to seriously consider the result, and want a simple, centralised mechanism for reporting.  People who do not know the IETF will struggle to find the appropriate WG and/or authors and so hopefully skip to the single email address, but the positioning of that has no suggestion of either commitment or seriousness and so I don’t think that meets their needs either.

Yes, they will struggle to find the appropriate working group.  As to positioning...


> 
> To be clear, when I say "commitment" I don’t mean "I commit to fix this problem" but "I commit to ensure this problem is put before the right people and given proper consideration".

… PRs welcome ;-).

Eliot