Create security vulnerability reporting mechanism

This documents the process to privately report OpenBMC
security vulnerabilities with the intention of giving
time to the project to fix the problem before public
disclosure.

This first commit establishes the project's scope.
The next commit:
 - provides guidelines to the OpenBMC security response team as it
   works to address the security issues and disclose publicly
 - establishes the "How to report security vulnerabilities" web
   page to tell problem submitters what to include in their report
   and what to expect from the OpenBMC security response team

Change-Id: Ib90070f998a815ba3f4430c7eb6ff84b3934e012
Signed-off-by: Joseph Reynolds <jrey@us.ibm.com>
1 file changed
tree: e2bfa9d058ab87844fd6b728ca3decbebb6e295a
  1. code-update/
  2. designs/
  3. development/
  4. logo/
  5. meetings/
  6. security/
  7. style/
  8. userguide/
  9. cheatsheet.md
  10. console.md
  11. CONTRIBUTING.md
  12. cpp-style-and-conventions.md
  13. host-management.md
  14. ipmi-architecture.md
  15. kernel-development.md
  16. LED-architecture.md
  17. LICENSE
  18. maintainer-workflow.md
  19. MAINTAINERS
  20. Makefile
  21. object-mapper.md
  22. openbmc-conversion.md
  23. openbmc-systemd.md
  24. README.md
  25. rest-api.md
  26. REST-cheatsheet.md
  27. run-test-docker.md
  28. sensor-architecture.md
  29. subtree.md
  30. user_management.md
  31. yocto-development.md
README.md

OpenBMC documentation

This repository contains documentation for OpenBMC as a whole. There may be component-specific documentation in the repository for each component.

OpenBMC Usage

These documents describe how to use OpenBMC, including using the programmatic interfaces to an OpenBMC system.

OpenBMC Development

These documents contain details on developing OpenBMC code itself

OpenBMC Goals

The OpenBMC project's aim is to create a highly extensible framework for BMC software and implement for data-center computer systems.

We have a few high-level objectives:

  • The OpenBMC framework must be extensible, easy to learn, and usable in a variety of programming languages.

  • Provide a REST API for external management, and allow for "pluggable" interfaces for other types of management interactions.

  • Provide a remote host console, accessible over the network

  • Persist network configuration settable from REST interface and host

  • Provide a robust solution for RTC management, exposed to the host.

  • Compatible with host firmware implementations for basic IPMI communication between host and BMC

  • Provide a flexible and hierarchical inventory tracking component

  • Maintain a sensor database and track thresholds

Technical Steering Committee

  • Brad Bishop (chair), IBM
  • Nancy Yuen, Google
  • Sai Dasari, Facebook
  • James Mihm, Intel
  • Ali Larijani, Microsoft