From mboxrd@z Thu Jan 1 00:00:00 1970 From: Leo Famulari Subject: Re: Call for volunteer(s) for Guix "security" web page Date: Tue, 27 Sep 2016 14:26:53 -0400 Message-ID: <20160927182653.GK2569@jasmine> References: <20160916161458.GA17780@jasmine> <20160925225248.GA13131@jasmine> <87ponp90ta.fsf@gnu.org> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="tVmo9FyGdCe4F4YN" Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:56680) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1box61-00026e-AZ for guix-devel@gnu.org; Tue, 27 Sep 2016 14:27:15 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1box5w-0002zF-Tx for guix-devel@gnu.org; Tue, 27 Sep 2016 14:27:12 -0400 Content-Disposition: inline In-Reply-To: <87ponp90ta.fsf@gnu.org> List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: Ludovic =?iso-8859-1?Q?Court=E8s?= Cc: guix-devel@gnu.org --tVmo9FyGdCe4F4YN Content-Type: multipart/mixed; boundary="+KJYzRxRHjYqLGl5" Content-Disposition: inline --+KJYzRxRHjYqLGl5 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Sep 27, 2016 at 10:58:09AM +0200, Ludovic Court=C3=A8s wrote: > > + (h2 "Release signatures") > > + (p "Releases of Guix and GuixSD are signed using the Op= enPGP " > > + "key with the fingerprint " > > + "3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5.= " > > + "This key can be obtained from XXX.") >=20 > Maybe link to > > or copy/paste the text? Though we should give a =E2=80=98gpg --recv-keys= =E2=80=99 > command that uses the full fingerprint instead of just the 64-bit ID > (which is still too small, some say.) >=20 > > + (h2 "Security updates") > > + (p "When security vulnerabilities are found in Guix or = the " > > + "packages provided by Guix, we will provide " > > + (a (@ (href ,(base-url "manual/html_node/Security-Up= dates.html"))) > > + "security updates") > > + " quickly and with minimal disruption for users.") >=20 > Maybe also that Guix is a =E2=80=9Crolling release=E2=80=9D, so there=E2= =80=99s currently no > separate security-fix branch and all critical fixes go to master? I tried to implement these suggestion in the attached patch. > I wonder if it would make sense to add a note on reproducible builds, > =E2=80=98guix challenge=E2=80=99 and all that; later maybe! Yes, later. Volunteers still welcome :) > Note that you=E2=80=99ll then need to commit the resulting HTML to CVS(!)= to > that the update pages show up, as per the instructions available on the > Savannah project page. If you=E2=80=99re unsure or anything, I can do th= at. I'll try it if this new patch is okay. --+KJYzRxRHjYqLGl5 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: attachment; filename="0001-www-security-New-page.patch" Content-Transfer-Encoding: quoted-printable =46rom eeff071ec9fbe527a97e2c7487e79e4b843916a1 Mon Sep 17 00:00:00 2001 =46rom: Leo Famulari Date: Sun, 25 Sep 2016 18:43:28 -0400 Subject: [PATCH] www: security: New page. * website/www/security.scm: New file. * website/www.scm (%web-pages): Add security-page. * website/www/shared.scm (html-page-links): Add "Security". --- website/www.scm | 2 ++ website/www/security.scm | 55 ++++++++++++++++++++++++++++++++++++++++++++= ++++ website/www/shared.scm | 1 + 3 files changed, 58 insertions(+) create mode 100644 website/www/security.scm diff --git a/website/www.scm b/website/www.scm index f0465eb..244830b 100644 --- a/website/www.scm +++ b/website/www.scm @@ -28,6 +28,7 @@ #:use-module (www about) #:use-module (www contribute) #:use-module (www help) + #:use-module (www security) #:use-module (sxml simple) #:use-module (sxml match) #:use-module (web client) @@ -335,6 +336,7 @@ Distribution.") ("donate/index.html" ,donate-page) ("download/index.html" ,download-page) ("help/index.html" ,help-page) + ("security/index.html" ,security-page) ;; ("packages/index.html" ,packages-page) ; Need Guix ;; ("packages/issues.html" ,issues-page) )) diff --git a/website/www/security.scm b/website/www/security.scm new file mode 100644 index 0000000..efe8315 --- /dev/null +++ b/website/www/security.scm @@ -0,0 +1,55 @@ +;;; GuixSD website --- GNU's advanced distro website +;;; Copyright =A9 2016 Leo Famulari +;;; +;;; This file is part of GuixSD website. +;;; +;;; GuixSD website is free software; you can redistribute it and/or modify= it +;;; under the terms of the GNU Affero General Public License as published = by +;;; the Free Software Foundation; either version 3 of the License, or (at +;;; your option) any later version. +;;; +;;; GuixSD website is distributed in the hope that it will be useful, but +;;; WITHOUT ANY WARRANTY; without even the implied warranty of +;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +;;; GNU Affero General Public License for more details. +;;; +;;; You should have received a copy of the GNU Affero General Public Licen= se +;;; along with GuixSD website. If not, see . + +(define-module (www security) + #:use-module (www utils) + #:use-module (www shared) + #:export (security-page)) + +(define (security-page) + `(html (@ (lang "en")) + ,(html-page-header "Security") + ,(html-page-links) + (div (@ (id "content-box")) + (article + (h1 "Security") + (h2 "How to report security issues") + (p "To report sensitive security issues in Guix itself or t= he packages it " + "provides, you can write to the private mailing list " + (a (@ (href "https://lists.gnu.org/mailman/listinfo/guix= -security")) + ("guix-security@gnu.org")) + ". This list is monitored by a small team of Guix " + "developers.") + (h2 "Release signatures") + (p "Releases of Guix and GuixSD are signed using the OpenPG= P " + "key with the fingerprint " + "3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5. " + "Users should " + (a (@ (href ,(base-url "manual/html_node/Binary-Installa= tion.html"))) + "verify") + " their downloads before extracting or running them.") + (h2 "Security updates") + (p "When security vulnerabilities are found in Guix or the " + "packages provided by Guix, we will provide " + (a (@ (href ,(base-url "manual/html_node/Security-Update= s.html"))) + "security updates") + " quickly and with minimal disruption for users.") + (p "Guix uses a \"rolling release\" model. All security " + "bug-fixes are pushed directly to the master branch. Th= ere" + " is no \"stable\" branch that only receives security fi= xes.") + ,(html-page-footer))))) diff --git a/website/www/shared.scm b/website/www/shared.scm index ed864ef..04be0f4 100644 --- a/website/www/shared.scm +++ b/website/www/shared.scm @@ -88,6 +88,7 @@ Functional package management,"))) ;; Note: valid only if `packages-page' is exported. (li (a (@ (href ,(base-url "packages"))) "Packages")) (li (a (@ (href ,(base-url "help"))) "Help")) + (li (a (@ (href ,(base-url "security"))) "Security")) (li (a (@ (href ,(base-url "contribute"))) "Contribute")) (li (a (@ (href ,(base-url "donate"))) "Donate")) (li (a (@ (href ,(base-url "about"))) "About"))))) --=20 2.10.0 --+KJYzRxRHjYqLGl5-- --tVmo9FyGdCe4F4YN Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJX6rntAAoJECZG+jC6yn8IApAP/j7yBQhXKuiG2Sk/thZGE512 jBavPpuPbLt0JPxXKoWYFnMeKGKU0c1fwrJvcHkkVK+r2EuvPmpwz8+Tstm+5MBh ic9BNcK3enpkAiOYJYWK+othCAfTe/tGnTjahos4LqLX1umvCIjgsePY5eMP+oyW vYIlTGMPYHmy07c4T/JUIDryfYBKYyQ7pa8H1A+iJ5mOXZeSzqizV8oTSnpzPSx0 y2ikc8CEMV/DcuZ8aKjcD6YqQ0P105SLXQxGVzXDQpXBnrOrj2AO1n0NkR40TyYo sgI97ZLccBsOhlbMASYsyQcKGkteS4P1EAH9McR9HgPEboid4WdtDfLT+hx2xdVd xJPo9TGCjWRe2SSFz7ZTuh9/G/U8PiNuR8hw4IeFdnffGQGd5i8NiZd9KjCLb+D/ RZ2FU1zqAidKNFRHq1pm+PLdAAkFDQOnqkRyMrOeYJ7c+IgdhXcEDg5/PoLZamfq uYclNxdOT3bBUAhSObzpBXkNYhhZf8/5yMDYJgpNQju2L4Edi6lf9HskQMsEpdwy ekP8/YsrvLUXWadAgZD20AJw6/JM7gZn39cukvvFqQcGcZqSG4y7Ir80kQipdFx/ qHDFIrP1cNW6jLi+vrp/tipjCPdtRhQQYOcYGkBIoQO2T3UGA8IHrBTVlMB2ZyMR lse1ZA5VocSNU54hEmU2 =I8Zk -----END PGP SIGNATURE----- --tVmo9FyGdCe4F4YN--