[
日期Prev][
日期Next][
Thread Prev][
Thread Next][
日期Index][
Thread Index]
Re: REF URL require ToU/Conduct policy
- To:kurt seifried <kurt@seifried.org>, "Millar, Thomas" <Thomas.Millar@hq.dhs.gov>
- 主题: Re: REF URL require ToU/Conduct policy
- 从: Art Manion <amanion@cert.org>
- 日期: Fri, 22 Jun 2018 09:39:23 -0400
- Authentication-results:spf =中性(发件人IP是198.49.146.235)smtp.mailfrom = cert.org;imc.mitre.org;dkim = test(已验证签名)标题d = cert.org; imc.mitre.org;dmarc = Pass Action = none header.from = cert.org;
- Autocrypt: addr=amanion@cert.org;keydata= xsFNBFoV8GMBEACXd7zH23Gx/W77Gr3Hs+n+BTtEt7IP0jU26vM9i4ASGewrIFZaRIOgL964 xX7Qk1wvxLl8HvUomLNHsJIZYG4EKcNkEfREO7lTx/3nYhG3wjF0DcHYuLwUkwAS3N6p9PQ7 bvEsXZMbfG0L8ASgRy0h4dWg+XGV4xT64REsIlzSsclVaHKTvP7FAMCDG70L/2wc+w24RAzs TYhfxLp4w8TBaVj/pONm+EDGVtK5u4LPLpLS0xmlGxgKP9mYSYAF3j44msAsbsuFPfWTa8JU s9yASol4pMECH24Cp3snHlSNHMl1APfVz3Xsfw5x/mekgCAPcGCARhA9ltRHLYgVMr1JCYZW JdyUB0UEiY0xvlb5JYfCFJm4fL8E2xoW/ATmDIxkU0qguL55AD2VYEwbWEsiP725YMSKBDaC cGH9fa2iuSxnflui6wR4K+FOjXfB2nF561q+HjlRb6bahdkYzWccX4fx3dSlZ6w62qRFNKAE 5zUfe2ZHwis9Bx9iqIp7Ini/sZ3ESJgMr7qlSSkYl10Esdl5CyFyxQ5g/LgzOlywdHazju13 /ckVBPo5vz9ZPOmafiUDSz6R/kbC0+nCrJSjIBvDfBWG7Gl2gon4HqB4Ji6r3+gFEFFJl+O/ PwID6Wh0jAjTQWvD+5L/vFTZ3/875Q2OcoxL9Hh4ls5ptg+7uwARAQABzR1BcnQgTWFuaW9u IDxhbWFuaW9uQGNlcnQub3JnPsLBkQQTAQgAOwIbAwIeAQIXgAULCQgHAwUVCgkICwUWAgMB ABYhBBHNrv2hhwlGumhcAVNt4uTRu2rfBQJaFmXUAhkBAAoJEFNt4uTRu2rfY1IP/j8cjh38 B0mnEo0Lk27r/mYRQhj2Yk/ClsAuPWea56BGAswtW2Q6g6DswcinjvTxrycSqAfpj2ZQP9Rx Ib/FsfozF5bC7Ja5/W4amH1NcTr/cE+sgKX3XZcRlOIrw2d0jmS1SAtDWPWn4zTYKoR7cbDz BAAABLb8/xQn7YFgf8nKQ4ZM0yOTUOnF7wG42UU0Y0ww3b+x2/ZMys0ntpz4ZSOgVJlun2xP WgFzkHu/fEJkVTPkZQweRULIGeFJBzuJP46+FMy6PJFZ/ZudzLy/VBMVAxA/yOszLbRvsl6z 3prRMgI+fJF/11ohRVQ5DWzS4AmfnI9RP6aOlUgEi4MYMcbYKrYGwguhGOpdg5iaO6ir4mhd OMcKLeV0ZqSef0ZpXTLQiTzWuFg9ECof5OCK/Y2VQ2EXyWIi7q4OPTFFoZBl2keoF6j0k272 PCYfJZIzq/ER9mfoH1+7nmIxvZ+XXQ6EoCCPv6le8VKQyZOFVgjD5rPvCeGZgAs9CRbfqYNm bF3jqeMk4kZbJ/+GsKv66M4R0VI2DijOLNF1kGXeU6s45lUBZmcT0Fb2MQ78rNItpeUP+XYj fpB0g/woOIstbSoOqpVZf++HIjnmMHj9jJrbFcMVIPac89EDcjbab3zPTMb5LHdk6AxMsWRM QqxofqoqqzNI7RiKisaDQhINXRwAzsBNBFoV8roBCADZKC4LLl6XhVvHCZZIwa9t2e+swdln YRtxwG1TDRxM1PaV7VDzB9K1FMRDC9CQQmiwI+Vl2j0Kn3BUvkCp3zmP+S7CRgK2vfP1GBAs CURE6j6M7S47qOhQvAvJK0qlF14tCBSX16CceGFV0XzfOUnQGt6m8AnVTr7WODilYsJPWUrj xLe3cKQJs7zk3iMLH1lJ7jNXlAQUgrTurVD7sl6PbKgbmDw3tIgXwep7tMOUzpiN4vCPALA+ WYL+0VxE03TZj/FqNzNrjoKXw+X3za675QnLsXww2cgLBV0Zjg3HZVDT5/0LlQjYqPnaWh3s ZG8uRJ104Thx1JVFLN4+8aDrABEBAAHCwXwEGAEIACYWIQQRza79oYcJRrpoXAFTbeLk0btq 3wUCWhXyugIbDAUJBaOagAAKCRBTbeLk0btq3zHYD/4vvS0lul3UKWGeRsVb33Y3eJ1yv4O3 EpBtmkVgCyxdG3zj8YrI15DCzhn6LSN3FqjV+wovE3SsxIrRjn7eoBA6SH54KlFRrW7pAARc NQaHFU+nX6ST6X3pOoNYzhXPZjkxoUpxyC+ehNARx+3tlQ0LScEr0L5Ttvr8W7nopWaXeuCt VI+8tjDnsCtWLaI2bYi3TYWDJdgWzNFSGYioqIxvQHIpokFZAx6fTKtEYaAqqg2cefRDgNoU bMcHmNtVMAXThLdNAx23F/sv2gV9a612ktCwl6hjKu1vuK4KGnhQu1T/oRk5EUA8jy5yBB6/ S5jwYbZR01EriZXSTXwT/gJcThBIXH8i9/4lUwdhV8+iBP/Pomhs8D7dPU7q1fUYlvVxn8iN K7IFoWdptGv+bhdNsf/qWGxVxOHwTAipr73Fl3eC5RovVM2aAK2Bx6xQFXlh4uPcI/S0gIPG tytClYZxtbXKM3qVhUTZgg1Ge6MgtgJkKWttzRciW0N9t5pZ/IbH7ax0NUv2hjHovGBXhuQb cVAEgmx90iyx9iRizCpgr3JyDNtKX+bc26aGI+mFOdiawp2HihhSazqiEpuNrxlQVWgMgmXa RduAg8L9z2CshZ6Zkcmwea79r8yDsBbwfJEZ71T0WWyfm1UcRVflPFAYb9xE8Ulgh8BQzw// z7Y5Lw==
- Cc: "pmeunier@cerias.purdue.edu" <pmeunier@cerias.purdue.edu>,CVE-编辑板列表<cve-editorial-board-list@mitre.org>
- Delivery-date:6月22日星期五10:16:11 2018
- Dkim-filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu w5MDdRPN029704
- Dkim-signature:v = 1;A = RSA-SHA256;C =放松/放松;d = cert.org;S = YC2BMWVRJ62M;t = 1529674767;BH = TMRXMBK1BDKS/92MP5KL1II0H1D2EVX5MZRZUL0FXN4 =;h =主题:to:cc:参考:从:日期:in-reply-to:from;B = AJ12IY37ZWD69TLWFCHUJFKZLFYM8DLNJDGU1LPT1ANV1ANV1UV3RXRXHYG5CBGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGI
- 陷入困境:<CABqVa3_gkActjXbRKknpabUFMa5dJE3_-cuLFRMuSx0_NBepRw@mail.gmail.com>
- Openpgp: preference=signencrypt
- 参考:<CABqVa385i5s0MY4zZL8A8BSbQbJqHxprWvhYr3Gxon3okzqwrQ@mail.gmail.com> <1529638198.25969.1.camel@cerias.purdue.edu> <7748E4BAEC3B964387F353535351DCBA1F0117EBDACF@d2aseprea010> <<<<CABqVa3_gkActjXbRKknpabUFMa5dJE3_-cuLFRMuSx0_NBepRw@mail.gmail.com>
- Spamdiagnosticmetadata: NSPM
- Spamdiagnosticoutput:1:99
- User-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.8.0
On 2018-06-21 23:55, Kurt Seifried wrote: > Yes, I click the links and if I can't read them all without a hassle > I set the CVE request to HOLD:LACK_REF_URL and they can provide > working urls... It's not ideal but I don't have a better solution > (well I do, but I haven't implemented it yet, TL;DR: download the > link with like wget and snapshot that). While I like the idea, I suspect the local copy provided to others violates the ToU. 1. At least one material and free/public/unencumbered URL or no CVE? 2. Allow free but encumbered (e.g., free login, click through ToU) URLs but flag them as such? If the world really wants CVE IDs, they'll do 1. Else, those who want to reduce their CVE exposure can hide behind ToU. An extension of #2 could be to flag or set state of a CVE entry. Not going so far as the CAN days, but "this entry is incomplete, the issuer gets a D+ passing grade (in the US), but it's in the corpus." The incompleteness could be for encumbered URLs/references or other issues. Some of the CNA metrics should be published, including a count/graph of incompleteness (also public-but-not-populated). - Art > On Thu, Jun 21, 2018 at 9:40 PM, Millar, Thomas > mailto:Thomas.Millar@hq.dhs.gov>> wrote: > > Yeah, this is unacceptable. On to the hard question: how can we > enforce free and open access to references? > > -----Original Message----- > From: Pascal Meunier [mailto:pmeunier@cerias.purdue.edu> <mailto:pmeunier@cerias.purdue.edu>]>发送:2018年6月21日23:30> to:Kurt Seifried mailto:kurt@seifried.org>>; > cve-editorial-board-list <mailto:cve-editorial-board-list@mitre.org>>>主题:回复:ref URL需要tou/行为策略>>我获得了登录对话框“使用您的Google帐户登录”,因此它是>登录和权利投降,并且它是Google,a>跟踪我查看的哪些安全信息,从何处和何时>,将与其他分析信息一起组成,以及我与其他人互动或在同一组织中工作的其他人以及Google知道或可以使用的所有其他事项推论>关于我们。>几乎不需要想象力,这是令人不寒而栗的 - 对于企业,学生,对于安全研究人员来说,甚至对于那些很好奇并且碰巧在错误的时间上查找它的人。此设置还使Google有可能有选择地>提供或保留安全信息。>>访问CVE安全参考应尽其所能匿名,并放弃权利以换取访问权限>与此相反,因为协议需要责任。还应在没有跟踪器的情况下提供对安全引用的访问。>但是,警务可能很困难和繁重。相比之下>在不登录和协议的情况下,很容易访问,因此我们应该将其最低限制。我非常希望看到为您的两个拟议句子而选择的“必须”。 > > Pascal > > On Thu, 2018-06-21 at 19:07 -0600, Kurt Seifried wrote: > > So real world example I have a CVE request which has a > reference url: > > > >https://issuetracker.google.com/issues/77809383> <https://issuetracker.google.com/issues/77809383>>>>>>>>>>> >> >>>>>>>>>>>>>>>>>我认可并同意Google服务条款>> <<https://www.google.com/policies/terms/> <https://www.google.com/policies/terms/>> and the Google IssueTracker > > Conduct Policy <https://issuetracker.google.com/terms> <https://issuetracker.google.com/terms>>. > > Which... I dunno. I don't want links that require logins > (because you > > can't grab them with tools easily), and I feel like this is the > same, > > and also requiring people to agree to a ToU (that for example > maybe > > requires you to give up your first born) is not really kosher. > > > > So I'd like to add to the CVE/CNA docs discussion: > > > > can we get ruling on reference URL's, specifically: > > > > 1) Reference MUST/MUST NOT/SHOULD/SHOULD NOT/etc... require a > login of > > any sort (even a free login) > > 2) Reference MUST/MUST NOT/SHOULD/SHOULD NOT/etc... require > acceptance > > of ToU/Conduct Policy/etc. > > > > In my mind I should be able to "wget >http://example.org/refurl/";和>>获取页面。少的东西是不可接受的。但是我也认为>>董事会应该讨论并对其进行规则进行记录。>>>>>>>>>> - >> kurt seifried> kurt@seifried.org <mailto:kurt@seifried.org>