From: Leo Famulari <leo@famulari.name>
To: "Ludovic Courtès" <ludo@gnu.org>
Cc: guix-devel@gnu.org
Subject: Re: Call for volunteer(s) for Guix "security" web page
Date: Tue, 27 Sep 2016 14:26:53 -0400 [thread overview]
Message-ID: <20160927182653.GK2569@jasmine> (raw)
In-Reply-To: <87ponp90ta.fsf@gnu.org>
[-- Attachment #1.1: Type: text/plain, Size: 1746 bytes --]
On Tue, Sep 27, 2016 at 10:58:09AM +0200, Ludovic Courtès wrote:
> > + (h2 "Release signatures")
> > + (p "Releases of Guix and GuixSD are signed using the OpenPGP "
> > + "key with the fingerprint "
> > + "3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5. "
> > + "This key can be obtained from XXX.")
>
> Maybe link to
> <https://www.gnu.org/software/guix/manual/html_node/Binary-Installation.html>
> or copy/paste the text? Though we should give a ‘gpg --recv-keys’
> command that uses the full fingerprint instead of just the 64-bit ID
> (which is still too small, some say.)
>
> > + (h2 "Security updates")
> > + (p "When security vulnerabilities are found in Guix or the "
> > + "packages provided by Guix, we will provide "
> > + (a (@ (href ,(base-url "manual/html_node/Security-Updates.html")))
> > + "security updates")
> > + " quickly and with minimal disruption for users.")
>
> Maybe also that Guix is a “rolling release”, so there’s currently no
> separate security-fix branch and all critical fixes go to master?
I tried to implement these suggestion in the attached patch.
> I wonder if it would make sense to add a note on reproducible builds,
> ‘guix challenge’ and all that; later maybe!
Yes, later. Volunteers still welcome :)
> Note that you’ll then need to commit the resulting HTML to CVS(!) to
> that the update pages show up, as per the instructions available on the
> Savannah project page. If you’re unsure or anything, I can do that.
I'll try it if this new patch is okay.
[-- Attachment #1.2: 0001-www-security-New-page.patch --]
[-- Type: text/plain, Size: 4926 bytes --]
From eeff071ec9fbe527a97e2c7487e79e4b843916a1 Mon Sep 17 00:00:00 2001
From: Leo Famulari <leo@famulari.name>
Date: Sun, 25 Sep 2016 18:43:28 -0400
Subject: [PATCH] www: security: New page.
* website/www/security.scm: New file.
* website/www.scm (%web-pages): Add security-page.
* website/www/shared.scm (html-page-links): Add "Security".
---
website/www.scm | 2 ++
website/www/security.scm | 55 ++++++++++++++++++++++++++++++++++++++++++++++++
website/www/shared.scm | 1 +
3 files changed, 58 insertions(+)
create mode 100644 website/www/security.scm
diff --git a/website/www.scm b/website/www.scm
index f0465eb..244830b 100644
--- a/website/www.scm
+++ b/website/www.scm
@@ -28,6 +28,7 @@
#:use-module (www about)
#:use-module (www contribute)
#:use-module (www help)
+ #:use-module (www security)
#:use-module (sxml simple)
#:use-module (sxml match)
#:use-module (web client)
@@ -335,6 +336,7 @@ Distribution.")
("donate/index.html" ,donate-page)
("download/index.html" ,download-page)
("help/index.html" ,help-page)
+ ("security/index.html" ,security-page)
;; ("packages/index.html" ,packages-page) ; Need Guix
;; ("packages/issues.html" ,issues-page)
))
diff --git a/website/www/security.scm b/website/www/security.scm
new file mode 100644
index 0000000..efe8315
--- /dev/null
+++ b/website/www/security.scm
@@ -0,0 +1,55 @@
+;;; GuixSD website --- GNU's advanced distro website
+;;; Copyright © 2016 Leo Famulari <leo@famulari.name>
+;;;
+;;; This file is part of GuixSD website.
+;;;
+;;; GuixSD website is free software; you can redistribute it and/or modify it
+;;; under the terms of the GNU Affero General Public License as published by
+;;; the Free Software Foundation; either version 3 of the License, or (at
+;;; your option) any later version.
+;;;
+;;; GuixSD website is distributed in the hope that it will be useful, but
+;;; WITHOUT ANY WARRANTY; without even the implied warranty of
+;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+;;; GNU Affero General Public License for more details.
+;;;
+;;; You should have received a copy of the GNU Affero General Public License
+;;; along with GuixSD website. If not, see <http://www.gnu.org/licenses/>.
+
+(define-module (www security)
+ #:use-module (www utils)
+ #:use-module (www shared)
+ #:export (security-page))
+
+(define (security-page)
+ `(html (@ (lang "en"))
+ ,(html-page-header "Security")
+ ,(html-page-links)
+ (div (@ (id "content-box"))
+ (article
+ (h1 "Security")
+ (h2 "How to report security issues")
+ (p "To report sensitive security issues in Guix itself or the packages it "
+ "provides, you can write to the private mailing list "
+ (a (@ (href "https://lists.gnu.org/mailman/listinfo/guix-security"))
+ ("guix-security@gnu.org"))
+ ". This list is monitored by a small team of Guix "
+ "developers.")
+ (h2 "Release signatures")
+ (p "Releases of Guix and GuixSD are signed using the OpenPGP "
+ "key with the fingerprint "
+ "3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5. "
+ "Users should "
+ (a (@ (href ,(base-url "manual/html_node/Binary-Installation.html")))
+ "verify")
+ " their downloads before extracting or running them.")
+ (h2 "Security updates")
+ (p "When security vulnerabilities are found in Guix or the "
+ "packages provided by Guix, we will provide "
+ (a (@ (href ,(base-url "manual/html_node/Security-Updates.html")))
+ "security updates")
+ " quickly and with minimal disruption for users.")
+ (p "Guix uses a \"rolling release\" model. All security "
+ "bug-fixes are pushed directly to the master branch. There"
+ " is no \"stable\" branch that only receives security fixes.")
+ ,(html-page-footer)))))
diff --git a/website/www/shared.scm b/website/www/shared.scm
index ed864ef..04be0f4 100644
--- a/website/www/shared.scm
+++ b/website/www/shared.scm
@@ -88,6 +88,7 @@ Functional package management,")))
;; Note: valid only if `packages-page' is exported.
(li (a (@ (href ,(base-url "packages"))) "Packages"))
(li (a (@ (href ,(base-url "help"))) "Help"))
+ (li (a (@ (href ,(base-url "security"))) "Security"))
(li (a (@ (href ,(base-url "contribute"))) "Contribute"))
(li (a (@ (href ,(base-url "donate"))) "Donate"))
(li (a (@ (href ,(base-url "about"))) "About")))))
--
2.10.0
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]
next prev parent reply other threads:[~2016-09-27 18:27 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-09-16 16:14 Call for volunteer(s) for Guix "security" web page Leo Famulari
2016-09-22 10:04 ` ng0
2016-09-27 18:04 ` Leo Famulari
2016-09-25 22:52 ` Leo Famulari
2016-09-27 8:58 ` Ludovic Courtès
2016-09-27 18:16 ` Leo Famulari
2016-09-28 21:08 ` Ludovic Courtès
2016-09-27 18:26 ` Leo Famulari [this message]
2016-09-28 21:07 ` Ludovic Courtès
2016-09-29 15:04 ` Leo Famulari
2016-09-30 12:08 ` Ludovic Courtès
2016-09-30 18:06 ` Leo Famulari
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://guix.gnu.org/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20160927182653.GK2569@jasmine \
--to=leo@famulari.name \
--cc=guix-devel@gnu.org \
--cc=ludo@gnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).