Moving usernames to a mailing list moves stepped down users etc. to the mailing list allowed subscribers (surely it wouldn't be a public read list...) instead of the file, I don't see how this actually solves the problem.GitHub handle => email is straightforward.--On Wed, Jul 22, 2020, 20:32 Lubomir I. Ivanov <neol...@gmail.com> wrote:forwarded to kubernetes-security-discuss:
On Thu, 23 Jul 2020 at 06:26, Lubomir I. Ivanov <neol...@gmail.com> wrote:
>
> hello,
>
> as you may have seen Joel Smith from the Product Security Committee
> has recently created a number of tickets in the kubernetes/kubernetes
> repository to update SECURITY_CONTACTS files in our staged
> repositories. this is due to the PSC delegating the per-repository
> security contact to the repository owners.
>
> e.g.
> https://github.com/kubernetes/kubernetes/issues/92092
> https://github.com/kubernetes/kubernetes/labels/committee%2Fproduct-security
>
> for reference, the SECURITY_CONTACTS idea was announced here:
> https://groups.google.com/forum/#!topic/kubernetes-dev/codeiIoQ6QE
>
> instead of including individuals and given this is not part of GitHub
> user automation, can we have the SECURITY_CONTACTS files direct users
> towards mailing list email addresses where volunteers from SIGs can be
> on rotation?
>
> for example:
> - SIG Foo can have a "sig-foo-security" mailing list.
> - all repositories owned by SIG Foo can have "sig-foo-security"
> present in SECURITY_CONTACTS.
> - it would be up to the SIG to keep the security mailing list up-to-date.
>
> the current method has a couple of issues:
> - can be noisy if regular changes are required.
> - a GitHub username *is not* really a security contact unless it
> matches the local-part of an email address or a slack nickname (i'm
> excluding communication on private GitHub repositories as a scenario).
> - suffers from the same problem as OWNERS files; a person steps down
> from working on the project and the enumerated contact is no longer
> active.
>
> lubomir
> --
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-architecture" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-arch...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-architecture/CAGDbWi9uNJLiV5FY%3DnCD9ANRbjCK58MmnKNiEXggOqNH1pn%3DQQ%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "kubernetes-sig-architecture" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-arch...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-architecture/CAOZRXm9bPnZ7%2BSfoxJ2d8yhGN%2B1BDquRNu6%2Bv_M%3DjCbqFMpz%3Dg%40mail.gmail.com.
On Thursday, July 23, 2020 at 11:54:31 AM UTC-7, Tim Allclair wrote:3. We default to contacting the approvers when security-contacts aren't specified. It is up to the PSC what depth to reach out to for approvers (probably not too much of a concern outside of k/k).I was recently made an approver for a subproject. As a consequence I was added to that subproject's communication mechanism for security incidents. At no point was I informed of or asked to abide by the Embargo Policy. I only know about it because I read the (out of date) SECURITY_CONTACTS file.While I believe it is reasonable to equate approvers with security contacts, I would suggest that this responsibility and the requirement to abide by the Embargo Policy be added to the approver section of https://github.com/kubernetes/community/blob/master/community-membership.md
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-architecture" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-arch...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-architecture/58f55ff9-1cd9-4d18-9c27-395e232661a8o%40googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "kubernetes-sig-architecture" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-sig-arch...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-sig-architecture/CAGDbWi9b3t5XRBfZkzFh8pLdYWOhFWD7O5TYDpBV_G%2BHsqk4fw%40mail.gmail.com.
+sfowler
We think that the best way forward is to go with Tim's plan below. (Remove SECURITY_CONTACTS, add an optional section to OWNERS, default to approvers if not present). Sam Fowler, one of the Associate Members of the PSC expressed interest in helping with this effort. I will work with him to get it underway. We'll close those issues as we go.
Thanks,
Joel
You received this message because you are subscribed to the Google Groups "kubernetes-security-discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-security...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kubernetes-security-discuss/CALXpagx7yWt1S4mU4ztrcH1wiic2NSBrwkAmAYeWG7cZ4NbA%2BA%40mail.gmail.com.
Yep, this effort overlaps a lot with the below issue, which I had
planned on working on as part of my Associate membership.
https://github.com/kubernetes/security/issues/56