Expand the security vulnerability page. (#3195)

This commit is contained in:
Martin Taillefer 2019-02-05 09:40:23 -08:00 committed by istio-bot
parent 149f9ddfbc
commit 2eebc0a3d5
3 changed files with 58 additions and 24 deletions

View File

@ -9,7 +9,9 @@ aliases:
icon: bugs
---
Oh no! You found a bug?
Oh no! You found a bug? We'd love to hear about it.
## Product bugs
Search our [issue database](https://github.com/istio/istio/issues/) to see if
we already know about your problem and learn about when we think we can fix
@ -20,13 +22,12 @@ what's going on.
If you think a bug is in fact a security vulnerability, please visit [Reporting Security Vulnerabilities](/about/security-vulnerabilities/)
to learn what to do.
If you're running on Kubernetes, consider including a [cluster state
archive](#generating-a-cluster-state-archive) in your bug report.
## Generating a cluster state archive
### Kubernetes cluster state archives
If you're running on Kubernetes, consider including a cluster state
archive with your bug report.
For convenience, you can run a dump script to produce an archive containing
all of the needed state from your Kubernetes cluster:
all of the relevant state from your Kubernetes cluster:
* Run via `curl`:
@ -85,3 +86,11 @@ containing:
{{< text bash >}}
$ kubectl get $(kubectl get crd --no-headers | awk '{printf "%s,",$1}END{printf "attributemanifests.config.istio.io\n"}') --all-namespaces
{{< /text >}}
## Documentation bugs
Search our [documentation issue database](https://github.com/istio/istio.io/issues/) to see if
we already know about your problem and learn about when we think we can fix
it. If you don't find your problem in the database, please navigate to the page
with the problem, then select the gear menu at the
top right of this page, and finally chose *Report a Site Bug*.

View File

@ -1,6 +1,6 @@
---
title: Reporting Security Vulnerabilities
description: Responsible disclosure for Istio security vulnerabilities.
title: Security Vulnerabilities
description: How we handle security vulnerabilities.
weight: 35
icon: vulnerabilities
---
@ -8,13 +8,15 @@ icon: vulnerabilities
We are very grateful to the security researchers and users that report
back Istio security vulnerabilities. We investigate every report thoroughly.
## Reporting a vulnerability
To make a report, send an email to the private
[`istio-security-vulnerabilities@googlegroups.com`](mailto:istio-security-vulnerabilities@googlegroups.com)
mailing list with the vulnerability details. For normal product bugs
unrelated to latent security vulnerabilities, please head to
our [Reporting Bugs](/about/bugs/) page to learn what to do.
## When to report a security vulnerability?
### When to report a security vulnerability?
Send us a report whenever you:
@ -23,7 +25,7 @@ Send us a report whenever you:
- Think a vulnerability is present in another project that Istio
depends on. For example, Envoy, Docker, or Kubernetes.
## When not to report a security vulnerability?
### When not to report a security vulnerability?
Don't send a vulnerability report if:
@ -31,9 +33,9 @@ Don't send a vulnerability report if:
- You need help applying security related updates.
- Your issue is not security related.
## Security vulnerability response
## Evaluation
The Istio security team acknowledges and analyzes each report within three
The Istio security team acknowledges and analyzes each vulnerability report within three
work days.
Any vulnerability information you share with the Istio security team stays
@ -43,15 +45,38 @@ projects. We only share the information as needed to fix the issue.
We keep the reporter updated as the status of the security issue moves
from `triaged`, to `identified fix`, to `release planning`.
## Public disclosure timing
## Fixing the issue
The Istio security team and the bug submitter negotiate a public
disclosure date between them. We prefer to fully disclose the bug as
soon as possible once a user mitigation is available.
We consider reasonable to delay disclosure when the bug or the fix is
not yet fully understood, the solution is not well-tested, or for
vendor coordination. The time frame for disclosure is from immediate,
especially if the bug is known publicly already, to a few weeks.
As a basic default, we expect the report date and the disclosure date
to be on the order of seven days apart. The Istio security team holds
the final say on setting a disclosure date.
Once a security vulnerability has been fully characterized, a fix is developed by the Istio team.
The development and testing for the fix happens in a private GitHub repository in order to prevent
premature disclosure of the vulnerability.
## Early disclosure
Before vulnerabilities are disclosed to the public, there is an early private disclosure to a small set of Istio partners.
This is to enable partners that distribute Istio binaries to prepare to distribute the fix.
Early disclosure happens three working days prior to full public disclosure.
Please fill out the [Early Security Vulnerability Disclosure](https://github.com/istio/community/issues/new?template=early-disclosure-request.md) form to request being
added to the early disclosure mailing list.
## Public disclosure
On the day chosen for public disclosure, a sequence of activities takes place as quickly as possible:
- Changes are merged from the private GitHub repository holding the fix into the appropriate set of public
branches.
- Release engineers ensure all necessary binaries are promptly built and published.
- Once the binaries are available, an announcement is sent out on the following channels:
- The [Istio blog](/blog)
- The [Announcements](https://discuss.istio.io/c/announcements) category on discuss.istio.io
- The [Istio Twitter feed](https://twitter.cqom/IstioMesh)
- The [#announcement channel on Slack](https://istio.slack.com/messages/CFXS256EQ/)
As much as possible this announcement should be actionable, and include any mitigating steps users can take prior to
upgrading to a fixed version. The recommended target time for these announcements is 16:00 UTC from Monday to Thursday.
This means the announcement will be seen morning Pacific, early evening Europe, and late evening Asia.

View File

@ -72,7 +72,7 @@ $ helm template install/kubernetes/helm/istio \
--set pilot.sidecar=false > istio-minimal.yaml
{{< /text >}}
然后**创建 istio-system namespace 并部署 Istio**
然后**创建 `istio-system` namespace 并部署 Istio**
{{< text bash >}}
$ kubectl create namespace istio-system