Hello,

Frank brought a relevant question on IRC as a follow-up to the recent addition we did to the vulnerability disclosure document: how to act under a "major incidient":

 https://curl.se/dev/vuln-disclosure.html#curl-major-incident-response

When such an incident happens in a remote future. How can external parties tell who is legitimate spokes person for the project and the curl security team?

The document suggests all communication to go through the security@ email address, so a reply to an email sent there should of course indicate that the person replying is part of the security team, but can we improve this? (Especially if the incident involves bringing down curl.se infrastructure.)

I realize we can have an elaborate setup with cross-signed PGP keys, but I fear the complexity of that might risk that we realize by the time we want to use it that it doesn't actually work...

Right now, we don't even publish the official list of curl security team member names. Even though they can be figured out with high accuracy if you just read enough disclosed hackerone reports.

How do other organizations handle this?

--

 / daniel.haxx.se || https://rock-solid.curl.dev
--
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to