unofficial mirror of guix-devel@gnu.org 
 help / color / mirror / code / Atom feed
From: Leo Famulari <leo@famulari.name>
To: "Ludovic Courtès" <ludo@gnu.org>
Cc: guix-devel@gnu.org
Subject: Re: Call for volunteer(s) for Guix "security" web page
Date: Tue, 27 Sep 2016 14:26:53 -0400	[thread overview]
Message-ID: <20160927182653.GK2569@jasmine> (raw)
In-Reply-To: <87ponp90ta.fsf@gnu.org>


[-- Attachment #1.1: Type: text/plain, Size: 1746 bytes --]

On Tue, Sep 27, 2016 at 10:58:09AM +0200, Ludovic Courtès wrote:
> > +               (h2 "Release signatures")
> > +               (p "Releases of Guix and GuixSD are signed using the OpenPGP "
> > +                  "key with the fingerprint "
> > +                  "3CE4 6455 8A84 FDC6 9DB4  0CFB 090B 1199 3D9A EBB5.  "
> > +                  "This key can be obtained from XXX.")
> 
> Maybe link to
> <https://www.gnu.org/software/guix/manual/html_node/Binary-Installation.html>
> or copy/paste the text?  Though we should give a ‘gpg --recv-keys’
> command that uses the full fingerprint instead of just the 64-bit ID
> (which is still too small, some say.)
> 
> > +               (h2 "Security updates")
> > +               (p "When security vulnerabilities are found in Guix or the "
> > +                  "packages provided by Guix, we will provide "
> > +                  (a (@ (href ,(base-url "manual/html_node/Security-Updates.html")))
> > +                     "security updates")
> > +                  " quickly and with minimal disruption for users.")
> 
> Maybe also that Guix is a “rolling release”, so there’s currently no
> separate security-fix branch and all critical fixes go to master?

I tried to implement these suggestion in the attached patch.

> I wonder if it would make sense to add a note on reproducible builds,
> ‘guix challenge’ and all that; later maybe!

Yes, later. Volunteers still welcome :)

> Note that you’ll then need to commit the resulting HTML to CVS(!) to
> that the update pages show up, as per the instructions available on the
> Savannah project page.  If you’re unsure or anything, I can do that.

I'll try it if this new patch is okay.

[-- Attachment #1.2: 0001-www-security-New-page.patch --]
[-- Type: text/plain, Size: 4926 bytes --]

From eeff071ec9fbe527a97e2c7487e79e4b843916a1 Mon Sep 17 00:00:00 2001
From: Leo Famulari <leo@famulari.name>
Date: Sun, 25 Sep 2016 18:43:28 -0400
Subject: [PATCH] www: security: New page.

* website/www/security.scm: New file.
* website/www.scm (%web-pages): Add security-page.
* website/www/shared.scm (html-page-links): Add "Security".
---
 website/www.scm          |  2 ++
 website/www/security.scm | 55 ++++++++++++++++++++++++++++++++++++++++++++++++
 website/www/shared.scm   |  1 +
 3 files changed, 58 insertions(+)
 create mode 100644 website/www/security.scm

diff --git a/website/www.scm b/website/www.scm
index f0465eb..244830b 100644
--- a/website/www.scm
+++ b/website/www.scm
@@ -28,6 +28,7 @@
   #:use-module (www about)
   #:use-module (www contribute)
   #:use-module (www help)
+  #:use-module (www security)
   #:use-module (sxml simple)
   #:use-module (sxml match)
   #:use-module (web client)
@@ -335,6 +336,7 @@ Distribution.")
     ("donate/index.html" ,donate-page)
     ("download/index.html" ,download-page)
     ("help/index.html" ,help-page)
+    ("security/index.html" ,security-page)
     ;; ("packages/index.html" ,packages-page) ; Need Guix
     ;; ("packages/issues.html" ,issues-page)
     ))
diff --git a/website/www/security.scm b/website/www/security.scm
new file mode 100644
index 0000000..efe8315
--- /dev/null
+++ b/website/www/security.scm
@@ -0,0 +1,55 @@
+;;; GuixSD website --- GNU's advanced distro website
+;;; Copyright © 2016 Leo Famulari <leo@famulari.name>
+;;;
+;;; This file is part of GuixSD website.
+;;;
+;;; GuixSD website is free software; you can redistribute it and/or modify it
+;;; under the terms of the GNU Affero General Public License as published by
+;;; the Free Software Foundation; either version 3 of the License, or (at
+;;; your option) any later version.
+;;;
+;;; GuixSD website is distributed in the hope that it will be useful, but
+;;; WITHOUT ANY WARRANTY; without even the implied warranty of
+;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+;;; GNU Affero General Public License for more details.
+;;;
+;;; You should have received a copy of the GNU Affero General Public License
+;;; along with GuixSD website.  If not, see <http://www.gnu.org/licenses/>.
+
+(define-module (www security)
+  #:use-module (www utils)
+  #:use-module (www shared)
+  #:export (security-page))
+
+(define (security-page)
+  `(html (@ (lang "en"))
+         ,(html-page-header "Security")
+         ,(html-page-links)
+         (div (@ (id "content-box"))
+              (article
+               (h1 "Security")
+               (h2 "How to report security issues")
+               (p "To report sensitive security issues in Guix itself or the packages it "
+                  "provides, you can write to the private mailing list "
+                  (a (@ (href "https://lists.gnu.org/mailman/listinfo/guix-security"))
+                     ("guix-security@gnu.org"))
+                     ".  This list is monitored by a small team of Guix "
+                     "developers.")
+               (h2 "Release signatures")
+               (p "Releases of Guix and GuixSD are signed using the OpenPGP "
+                  "key with the fingerprint "
+                  "3CE4 6455 8A84 FDC6 9DB4  0CFB 090B 1199 3D9A EBB5.  "
+                  "Users should "
+                  (a (@ (href ,(base-url "manual/html_node/Binary-Installation.html")))
+                     "verify")
+                  " their downloads before extracting or running them.")
+               (h2 "Security updates")
+               (p "When security vulnerabilities are found in Guix or the "
+                  "packages provided by Guix, we will provide "
+                  (a (@ (href ,(base-url "manual/html_node/Security-Updates.html")))
+                     "security updates")
+                  " quickly and with minimal disruption for users.")
+               (p "Guix uses a \"rolling release\" model.  All security "
+                  "bug-fixes are pushed directly to the master branch.  There"
+                  " is no \"stable\" branch that only receives security fixes.")
+               ,(html-page-footer)))))
diff --git a/website/www/shared.scm b/website/www/shared.scm
index ed864ef..04be0f4 100644
--- a/website/www/shared.scm
+++ b/website/www/shared.scm
@@ -88,6 +88,7 @@ Functional package management,")))
 	    ;; Note: valid only if `packages-page' is exported.
 	    (li (a (@ (href ,(base-url "packages"))) "Packages"))
 	    (li (a (@ (href ,(base-url "help"))) "Help"))
+	    (li (a (@ (href ,(base-url "security"))) "Security"))
 	    (li (a (@ (href ,(base-url "contribute"))) "Contribute"))
 	    (li (a (@ (href ,(base-url "donate"))) "Donate"))
 	    (li (a (@ (href ,(base-url "about"))) "About")))))
-- 
2.10.0


[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]

  parent reply	other threads:[~2016-09-27 18:27 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-09-16 16:14 Call for volunteer(s) for Guix "security" web page Leo Famulari
2016-09-22 10:04 ` ng0
2016-09-27 18:04   ` Leo Famulari
2016-09-25 22:52 ` Leo Famulari
2016-09-27  8:58   ` Ludovic Courtès
2016-09-27 18:16     ` Leo Famulari
2016-09-28 21:08       ` Ludovic Courtès
2016-09-27 18:26     ` Leo Famulari [this message]
2016-09-28 21:07       ` Ludovic Courtès
2016-09-29 15:04       ` Leo Famulari
2016-09-30 12:08         ` Ludovic Courtès
2016-09-30 18:06           ` Leo Famulari

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://guix.gnu.org/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20160927182653.GK2569@jasmine \
    --to=leo@famulari.name \
    --cc=guix-devel@gnu.org \
    --cc=ludo@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).