docs: Security policy #838

Merged
Jade merged 2 commits from jade/security-policy into main 2025-05-26 16:02:10 +00:00
Owner
No description provided.
Jade added 1 commit 2025-05-24 23:36:54 +00:00
docs: Security policy
Some checks failed
Rust Checks / Format (push) Successful in 1m22s
Rust Checks / Clippy (push) Successful in 4m54s
Rust Checks / Cargo Test (push) Failing after 4m46s
Documentation / Build and Deploy Documentation (pull_request) Successful in 1m27s
0ba77674c7
Jade 2025-05-24 23:36:59 +00:00
nex requested changes 2025-05-25 01:33:53 +00:00
nex left a comment
Owner

mostly looks good, some requests/notes regarding clarity

mostly looks good, some requests/notes regarding clarity
@ -0,0 +8,4 @@
| Version | Supported |
| -------------- |:----------------:|
| Latest release | ✅ |
Owner

We should have a grace period for new releases where we still support the previous release, to give people time to migrate over and whatnot. If this is implicit, it is not clear

We should have a grace period for new releases where we still support the previous release, to give people time to migrate over and whatnot. If this is implicit, it is not clear
Author
Owner

Do we have the resources to backport to N versons, and is there a reason why people wouldn't upgrade?

Do we have the resources to backport to N versons, and is there a reason why people wouldn't upgrade?
Owner

Issuing patches for security vulns isn't usually too big of a task. Sometimes people don't upgrade because they're either unaware or simply haven't had the time to (hell, one of my own servers is still running old conduwuit main 😅)
Backporting to the last release is rarely an issue, but if you don't think it's worth it then we don't need to bother. We'll just have to be extra careful to make sure upgrades go smoothly

Issuing patches for security vulns isn't usually too big of a task. Sometimes people don't upgrade because they're either unaware or simply haven't had the time to (hell, one of my own servers is still running old conduwuit main 😅) Backporting to the last release is rarely an issue, but if you don't think it's worth it then we don't need to bother. We'll just have to be extra careful to make sure upgrades go smoothly
Jade marked this conversation as resolved
@ -0,0 +18,4 @@
We appreciate the efforts of security researchers and the community in identifying and reporting vulnerabilities. To ensure that potential vulnerabilities are addressed properly, please follow these guidelines:
1. **Email the security team** directly at [security@continuwuity.org](mailto:security@continuwuity.org)
Owner

Is there PGP enabled on this inbox? If not, I don't think an unencrypted channel should be prioritized for security issues over encrypted ones

Is there PGP enabled on this inbox? If not, I don't think an unencrypted channel should be prioritized for security issues over encrypted ones
Author
Owner

This just forwards to all of our continuwuity emails, so not sure PGP supports multi-recipent encryption. We could have a shared key?

But yeah, I agree that we can probably move it down in the list.

This just forwards to all of our continuwuity emails, so not sure PGP supports multi-recipent encryption. We could have a shared key? But yeah, I agree that we can probably move it down in the list.
Owner

pgp does support it, but not in this way. I think the ideal would just be moving the email down the list then

pgp does support it, but not in this way. I think the ideal would just be moving the email down the list then
Jade marked this conversation as resolved
@ -0,0 +22,4 @@
2. Contact members of the team over E2EE private message.
- [@jade:ellis.link](https://matrix.to/#/@jade:ellis.link)
- [@nex:nexy7574.co.uk](https://matrix.to/#/@nex:nexy7574.co.uk) <!-- ? -->
3. **Do not disclose the vulnerability publicly** until it has been addressed
Owner

People sometimes accidentally disclose vulnerabilities as they discover them, perhaps a mention that concerns regarding security should go to private channels in case there's any doubt? Means people won't go "hmm I wonder if this is a security- OH NO this is a security issue" in a public channel

People sometimes accidentally disclose vulnerabilities as they discover them, perhaps a mention that concerns regarding security should go to private channels in case there's any doubt? Means people won't go "hmm I wonder if this is a security- OH NO this is a security issue" in a public channel
Author
Owner

Good idea

Good idea
Jade marked this conversation as resolved
nex added the
Security
label 2025-05-25 01:36:33 +00:00
Aranjedeath approved these changes 2025-05-25 23:57:35 +00:00
Jade added 1 commit 2025-05-26 14:02:04 +00:00
docs: Apply feedback on security policy
Some checks are pending
Documentation / Build and Deploy Documentation (pull_request) Successful in 45s
Documentation / Build and Deploy Documentation (push) Waiting to run
Rust Checks / Format (push) Waiting to run
Rust Checks / Clippy (push) Waiting to run
Rust Checks / Cargo Test (push) Waiting to run
e8d823a653
Jade merged commit e8d823a653 into main 2025-05-26 16:02:10 +00:00
Sign in to join this conversation.
No reviewers
No milestone
No project
No assignees
3 participants
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: continuwuation/continuwuity#838
No description provided.