bug-grub
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

VINCE: New CERT/CC vulnerability coordination platform [VU#273963] - gnu


From: CERT Coordination Center
Subject: VINCE: New CERT/CC vulnerability coordination platform [VU#273963] - gnu_grub
Date: Wed, 16 Sep 2020 18:02:24 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


In March, the CERT/CC started using a custom-developed web-based platform for 
vulnerability coordination.  This platform is called VINCE: Vulnerability 
Information and Coordination Environment.  We have been slowly moving new 
vulnerability reports to VINCE and inviting vendors to VINCE on a case-by-case 
basis.

VINCE represents a significant change in how we perform vulnerability 
coordination.  Change has costs, and we realize that we are asking you to share 
these costs.  We believe the investment will pay off by reducing per-case 
effort, improving scalability and coverage, and maturing the state of 
coordinated vulnerability disclosure practice.

We are now actively transitioning to VINCE as the primary means to

 * receive vulnerability reports
 * notify vendors about potential vulnerabilities
 * discuss and coordinate vulnerability reports before public disclosure
 * allow vendors to provide status and vendor statements
 * review and publish vulnerability notes
 * allow vendors to manage their contact information

Some changes of note:

 * We are intentionally stepping back from the role of central communications 
hub and mediator of all communications.  Our default stance is that reporters 
(researchers) and vendors will all participate in a shared per-case discussion 
forum in VINCE.  There are features in VINCE that support private communication 
between CERT/CC and vendors, but we advocate a more collaborative and efficient 
coordination model, thus the shared case discussion forum.

 * Expect less and less email from us, including PGP email.  Notifications for 
new vulnerability reports will be made primarily through VINCE.

 * VINCE sends notification mail From: <cert+donotreply@cert.org>.  
Notifications are not PGP signed or encrypted and do not contain case details 
or other sensitive information.

 * <cert@cert.org> (with a VU# ID in the subject please) still works, and 
<cert+donotreply@cert.org> is effectively <cert@cert.org>, but we encourage you 
to at least start testing VINCE.

 * We recognize that using many different web platforms for vulnerability 
coordination will not scale well.  Our proposed solution is an API.  While 
initially designed for VINCE, we see the need for a global interoperability 
standard, and welcome testing, feedback, and feature requests for the API.

  <https://vuls.cert.org/confluence/display/VIN/API>

As of yet there is no deadline or requirement to switch to VINCE, and we are 
still handling some coordination through PGP email.  However, as the transition 
continues, email and PGP will become a secondary channel for coordination and 
not receive the same level of service as VINCE.

We invite and encourage you to register for a VINCE account:

  <https://kb.cert.org/vince/>

The model is that individuals create VINCE accounts, then those VINCE users are 
assigned to one or more vendor groups.  An authorized VINCE user can be given 
administrative privileges to manage the vendor group.  A VINCE vendor group is 
roughly analogous to a PSIRT.

We take considerable care to properly associate user accounts with vendor 
groups.  We use our existing contacts, PGP, and other evidence to verify 
associations.  After you register for a VINCE account, verification may cause 
delay before we associate you with a vendor group.  Providing evidence (e.g., 
PGP-signed mail) of your association with a vendor will speed up the 
verification process.

VINCE documentation:

  <https://vuls.cert.org/confluence/display/VIN/VINCE+Documentation>


Regards,

  - Art

- --
              Art Manion - CERT Coordination Center
    <https://kb.cert.org/>   <cert@cert.org>   +1 412-268-5800
        6216 58A6 CE37 C480 E55B  F4D9 45FD 541A B93E D52B

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=P7VO
-----END PGP SIGNATURE-----



reply via email to

[Prev in Thread] Current Thread [Next in Thread]