These are the guidelines for OpenBMC security responders, including the security response team, project owners, and community members who are responding to problems reported by the security vulnerability reporting process.
Each project within OpenBMC works independently to resolve security vulnerabilities. The security response team helps the maintainers, provides consistency within the OpenBMC project, and helps to get CVEs assigned.
Here are the primary expectations:
Workflow highlights:
Handle new problem reports.
Analyze the problem and engage collaborators as needed (upstream, downstream, and OpenBMC).
Considerations in the CERT Guide to Coordinated Vulnerability Disclosure (SPECIAL REPORT CMU/SEI-2017-SR-022) may guide the process.
Example collaborations:
For OpenBMC problems.
Repository maintainer process steps: 1. Create a private gerrit code review and oversee development of the fix. 2. Create a draft advisory under github.com/openbmc//security/advisories. Please follow guidance in the OpenBMC Security Advisory Template. Add the openbmc security-response group and other stakeholders to the advisory. 3. Review the security bulletin with stakeholders to get it ready to publish. 4. Work with the SRT to identify CVEs. If you are unsure what counts as a vulnerability, please consult with the SRT. For example, independent bugs should have separate CVEs. A security advisory can reference multiple CVEs. When the CVE is known, add it to the security advisory, and reference it in the commit message, stating how the fix relates to the CVE. For example: This fixes CVE-yyyy-nnnnn. Doing so helps downstream security responders. If the commit is a partial fix, please explain that and provide references to the other parts of the fix. 5. If stakeholders negotiate for coordinated disclosure, plan to release the fix and the security advisory on the negotiated day. 6. When the code fix and the advisory are both ready (subject to coordinated disclosure), please merge the fixes (and make any private review be public) publish the security advisory, and email the security-response team.
The OpenBMC security response team has received the problem.
OpenBMC Security Advisory Title: ... ...summary: include CVEs, releases affected, etc.... The CVSS score for these vulnerabilities is "...", with temporal score "...", with the following notes: https://www.first.org/cvss/calculator/3.0 The fix is in the https://github.com/openbmc/... repository as git commit ID .... For more information, see OpenBMC contact information at https://github.com/openbmc/openbmc file README.md. Credit for finding these problems: ...
When the Security Advisory is created, inform the OpenBMC community by sending email like this:
TO: openbmc-security@lists.ozlabs.org, openbmc@lists.ozlabs.org SUBJECT: [Security Advisory] ${subject} The OpenBMC Security Response team has released an OpenBMC Security Advisory: ${url} An OpenBMC Security Advisory explains a security vulnerability, its severity, and how to protect systems that are built on OpenBMC. For more information about OpenBMC Security Response, see: https://github.com/openbmc/docs/blob/master/security/obmc-security-response-team.md
Some of these guidelines were collected from:
The security response team (SRT) is controlled by the OpenBMC Technical Steering Committee, including membership on the team. General considerations for SRT membership:
The security response team uses the openbmc-security at lists.ozlabs.org
private email list as a channel for confidential communication, so its membership reflects the composition of the security response team. The list membership should be reviewed periodically and can be managed from https://lists.ozlabs.org/listinfo/openbmc-security
.
The email list subscribers should be reminded periodically to protect access to the emails from the list because of the sensitive information they contain.
The email list membership is not intended to be secret. For example, we can discuss it a public forum. However, no effort is made to make the list's membership public.
The email list identification is for privately reporting OpenBMC security vulnerabilities
with description: This email list is for privately reporting OpenBMC security vulnerabilities. List membership is limited to the OpenBMC security response team. For more information, see https://github.com/openbmc/docs/blob/master/security/how-to-report-a-security-vulnerability.md
Sample response for denying list membership:
Thanks for your interest in OpenBMC security. Subscriptions to the openbmc-security@lists.ozlabs.org email list are by invitation only and are typically extended only to security response team members. For more information, see https://github.com/openbmc/docs/security or attend a security working group meeting: https://github.com/openbmc/openbmc/wiki/Security-working-group. Yours truly, OpenBMC security response team