Skip to main content

A File Format to Aid in Security Vulnerability Disclosure
draft-foudil-securitytxt-12

Revision differences

Document history

Date Rev. By Action
2022-04-25
12 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2021-08-10
12 (System) RFC Editor state changed to AUTH48
2021-07-29
12 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2021-07-14
12 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2021-07-13
12 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2021-07-13
12 (System) IANA Action state changed to In Progress from Waiting on Authors
2021-07-13
12 (System) IANA Action state changed to Waiting on Authors from In Progress
2021-07-13
12 (System) IANA Action state changed to In Progress from Waiting on Authors
2021-07-13
12 (System) IANA Action state changed to Waiting on Authors from In Progress
2021-07-09
12 (System) RFC Editor state changed to EDIT
2021-07-09
12 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2021-07-09
12 (System) Announcement was received by RFC Editor
2021-07-09
12 (System) IANA Action state changed to In Progress
2021-07-09
12 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2021-07-09
12 Amy Vezza IESG has approved the document
2021-07-09
12 Amy Vezza Closed "Approve" ballot
2021-07-09
12 Amy Vezza Ballot approval text was generated
2021-07-08
12 Benjamin Kaduk IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2021-05-24
12 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss
2021-05-24
12 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to Yes from No Objection
2021-05-24
12 Roman Danyliw [Ballot comment]
(Updated for -12)
Thank you to Tero Kivinen for the SECDIR review.

Thank you for addressing some of the DISCUSS and COMMENT feedback.
2021-05-24
12 Roman Danyliw [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss
2021-05-24
12 Yakov Shafranovich New version available: draft-foudil-securitytxt-12.txt
2021-05-24
12 (System) New version approved
2021-05-24
12 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2021-05-24
12 Yakov Shafranovich Uploaded new revision
2021-05-13
11 Roman Danyliw
[Ballot discuss]
(Updated for -11)

** Section 3.5.2. Per “The purpose of this field is to allow a digital signature to be applied to the …
[Ballot discuss]
(Updated for -11)

** Section 3.5.2. Per “The purpose of this field is to allow a digital signature to be applied to the locations of the "security.txt" file”, if a security.txt file is retrieved over https via “URL-A”, and the Canonical field does not contain URL-A, should this file be trusted?
2021-05-13
11 Roman Danyliw
[Ballot comment]
(Updated for -11)
Thank you to Tero Kivinen for the SECDIR review.

Thank you for addressing some of the DISCUSS and COMMENT feedback. …
[Ballot comment]
(Updated for -11)
Thank you to Tero Kivinen for the SECDIR review.

Thank you for addressing some of the DISCUSS and COMMENT feedback.

====

** Section 6.1.  Per “Security researchers should triage  the "security.txt" file including verifying the digital signature and checking any available historical  records before using the information contained in the file”

-- what historical records are being suggested here?  Is it older versions of the security.txt file?

** Section 6.3.  Per “Organizations must use …”, should this be a normative MUST?

** Section 6.4.  Per “Implementors … may choose not to parse files larger …”, should this be a normative MAY?  Should this be restated to say that the MTI is supporting files of 32KBs and smaller?
2021-05-13
11 Roman Danyliw Ballot comment and discuss text updated for Roman Danyliw
2021-04-22
11 Lars Eggert
[Ballot discuss]
Taking over Alissa's discuss, because I see no changes in -11 related to it:

> I realize this was discussed during IETF last …
[Ballot discuss]
Taking over Alissa's discuss, because I see no changes in -11 related to it:

> I realize this was discussed during IETF last call, but the document still
> seems unclear on whether the contents of security.txt are meant to be consumed
> by a human or a machine. In some places the syntax of fields is specified in
> detail, which would imply machine readability is expected. The ABNF is
> provided, although it is not normative. The registry policy does not require
> any formal specification of the format of new fields nor a requirement that
> field formats even be documented. In short, I can't tell whether security.txt
> files are meant to be machine-consumable. If they are, then the registry
> entries need to be more tightly specified and the ABNF should probably be
> normative. If they're not, I'm not sure why the field definitions are
> constrained to specific formats beyond saying whether they should be URIs or
> free text.
2021-04-22
11 Lars Eggert [Ballot Position Update] New position, Discuss, has been recorded for Lars Eggert
2021-04-22
11 Robert Wilton [Ballot Position Update] Position for Robert Wilton has been changed to No Objection from Discuss
2021-03-31
11 Murray Kucherawy
[Ballot comment]
Thanks for addressing my DISCUSS issues and comments.  I also checked Barry's original DISCUSS and it looks like all of that got covered …
[Ballot comment]
Thanks for addressing my DISCUSS issues and comments.  I also checked Barry's original DISCUSS and it looks like all of that got covered as well.  So I'll get out of your way here.
2021-03-31
11 Murray Kucherawy [Ballot Position Update] Position for Murray Kucherawy has been changed to No Objection from Discuss
2021-03-11
11 (System) Sub state has been changed to AD Followup from Revised ID Needed
2021-03-11
11 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2021-03-11
11 Yakov Shafranovich New version available: draft-foudil-securitytxt-11.txt
2021-03-11
11 (System) New version approved
2021-03-11
11 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2021-03-11
11 Yakov Shafranovich Uploaded new revision
2021-01-24
10 Tero Kivinen Closed request for Telechat review by SECDIR with state 'Overtaken by Events'
2021-01-24
10 Tero Kivinen Assignment of request for Telechat review by SECDIR to Tero Kivinen was marked no-response
2021-01-22
10 Murray Kucherawy
[Ballot discuss]
Sorry to pile on, but I'm really not clear on the whole filesystem portion of this.

  A "security.txt" file that is found …
[Ballot discuss]
Sorry to pile on, but I'm really not clear on the whole filesystem portion of this.

  A "security.txt" file that is found in a file system MUST only apply
  to the folder in which it is located and that folder's subfolders.
  The file does not apply to any of the folder's parent or sibling
  folders.

I take this to mean if I want to report a vulnerability related to the filesystem or something in it (a vulnerable binary, perhaps, or a writable password file), I should look for "security.txt" in the directory of interest and use that one; if it's missing, I walk upwards until I find one, and use the first one I found.  (If that's not correct, then this needs to be clarified, or given the other DISCUSSes, it may need to be clarified anyway.)

What if I want to report something unrelated to the filesystem?  Suppose I somehow acquire a root shell on a machine I shouldn't be able to access, and that process has no current working directory.  I look around and find "security.txt" files in several directories.  Which one do I use?  Sitting at a shell prompt doesn't automatically map to a place in the filesystem tree where I should start looking.
2021-01-22
10 Murray Kucherawy Ballot discuss text updated for Murray Kucherawy
2021-01-21
10 Murray Kucherawy
[Ballot comment]
I support Alissa and Barry's DISCUSS positions.

Some additional feedback:

Section 4.1:

  Web-based services MUST place the security.txt file under the
  …
[Ballot comment]
I support Alissa and Barry's DISCUSS positions.

Some additional feedback:

Section 4.1:

  Web-based services MUST place the security.txt file under the
  "/.well-known/" path; e.g. https://example.com/.well-known/
  security.txt as per [RFC8615].

It's not really the web server putting it there, right?  It's some human, and the web server just makes it available at that path.  I suggest:

  Web-based services MUST make the security.txt file available at the
  "/.well-known/" path; e.g. https://example.com/.well-known/
  security.txt, as per [RFC8615].

Similarly:

  File systems SHOULD place the "security.txt" file under the root
  directory; e.g., "/security.txt", "C:\security.txt".

I suggest:

  The "security.txt" file SHOULD be placed in the root
  directory; e.g., "/security.txt", "C:\security.txt".

Also, why is this a SHOULD?  Why might someone put it elsewhere, and what implications does doing so have?

Section 4.3 talks about extension fields in the content, but that's part of Section 4 which talks about location of the file.  I think 4.3 belongs at 5.1 instead.
2021-01-21
10 Murray Kucherawy Ballot comment text updated for Murray Kucherawy
2021-01-21
10 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2021-01-21
10 Cindy Morgan Changed consensus to Yes from Unknown
2021-01-21
10 Alissa Cooper
[Ballot discuss]
I realize this was discussed during IETF last call, but the document still seems unclear on whether the contents of security.txt are meant …
[Ballot discuss]
I realize this was discussed during IETF last call, but the document still seems unclear on whether the contents of security.txt are meant to be consumed by a human or a machine. In some places the syntax of fields is specified in detail, which would imply machine readability is expected. The ABNF is provided, although it is not normative. The registry policy does not require any formal specification of the format of new fields nor a requirement that field formats even be documented. In short, I can't tell whether security.txt files are meant to be machine-consumable. If they are, then the registry entries need to be more tightly specified and the ABNF should probably be normative. If they're not, I'm not sure why the field definitions are constrained to specific formats beyond saying whether they should be URIs or free text.
2021-01-21
10 Alissa Cooper
[Ballot comment]
I support Barry's DISCUSS.

== Section 3 ==

OLD
On HTTP servers, the file MUST be accessed via HTTP 1.0 or a higher …
[Ballot comment]
I support Barry's DISCUSS.

== Section 3 ==

OLD
On HTTP servers, the file MUST be accessed via HTTP 1.0 or a higher
  version and the "https" scheme (as per [RFC1945] and section 2.7.2 of
  [RFC7230]).

NEW
On HTTP servers, the file MUST be accessed via HTTP 1.0 or a higher
  version and the file access MUST use the "https" scheme (as per [RFC1945] and section 2.7.2 of [RFC7230]).
 
'A "field" MUST always consist of a name and a value' --> why is "field" in quotes? (It is not in quotes in the prior paragraph.)

s/It is important to note that each field MUST appear on its own line./Each field MUST appear on its own line./

== Section 3.2 and 3.3 ==

This reflects my ignorance, but do we not have a documented best practice recommendation for character set usage for free-form text, akin to RFC 5198?

== Section 3.5.6 ==

This field does not seem to belong in the security.txt specification.
2021-01-21
10 Alissa Cooper [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper
2021-01-21
10 Robert Wilton
[Ballot discuss]
Hi,

Thank you for this document.  I like that it provides a fairly simple solution to providing vulnerability reporting information, although I also …
[Ballot discuss]
Hi,

Thank you for this document.  I like that it provides a fairly simple solution to providing vulnerability reporting information, although I also have some sympathy with the observation that if the server is compromised then security.txt could also be compromised.

However, I have a concern about the document both being machine readable and also including an expiry date.  This would seem to offer an easy mechanism to probe websites for those that have out of date security.txt files and hence may have more lax security practices, or potentially help provide indirect information about what software versions a website might be using.  Alternatively, this will end up as Barry has suggested, with lots of old expiry dates.

Arguably, the best alternative might be just to not provide a date at all, and rely on the humans to check the provenance of the information, and treat it with suitable caution.  An alternative possibility could be just to define a field for when the information was last updated.  This doesn't go out of date, but helps provide some clue as to whether the information might be stale or not.

Regards,
Rob
2021-01-21
10 Robert Wilton
[Ballot comment]
And one non blocking comment:

I wasn't quite sure whether the intention is that this file is read and acted on by security …
[Ballot comment]
And one non blocking comment:

I wasn't quite sure whether the intention is that this file is read and acted on by security researchers, or by scripts?  Having a prescriptive format feels like it is optimized for scripts, but then the text states in various places that security researchers need to check the provenance of the information contained in the file.  I guess that it wasn't really clear to me why a precise format, ABNF and registry needs to be defined at all, and why it wouldn't just be sufficient to say that it is a text file which should contain x, y & z and just leave it at that.
2021-01-21
10 Robert Wilton [Ballot Position Update] New position, Discuss, has been recorded for Robert Wilton
2021-01-20
10 Murray Kucherawy
[Ballot discuss]
Sorry to pile on, but I'm really not clear on the whole filesystem portion of this.

  A "security.txt" file that is found …
[Ballot discuss]
Sorry to pile on, but I'm really not clear on the whole filesystem portion of this.

  A "security.txt" file that is found in a file system MUST only apply
  to the folder in which it is located and that folder's subfolders.
  The file does not apply to any of the folder's parent or sibling
  folders.

I take this to mean if I want to report a vulnerability related to the filesystem or something in it (a vulnerable binary, perhaps, or a writable password file, I should look for "security.txt" in the directory of interest and use that one; if it's missing, I walk upwards until I find one, and use the first one I found.  (If that's not correct, then this needs to be clarified, or given the other DISCUSSes, it may need to be clarified anyway.)

What if I want to report something unrelated to the filesystem?  Suppose I somehow acquire a root shell on a machine I shouldn't be able to access, and that process has no current working directory.  I look around and find "security.txt" files in several directories.  Which one do I use?  Sitting at a shell prompt doesn't automatically map to a place in the filesystem tree where I should start looking.
2021-01-20
10 Murray Kucherawy
[Ballot comment]
I support Barry's DISCUSS.  Some additional feedback:

Section 4.1:

  Web-based services MUST place the security.txt file under the
  "/.well-known/" path; e.g. …
[Ballot comment]
I support Barry's DISCUSS.  Some additional feedback:

Section 4.1:

  Web-based services MUST place the security.txt file under the
  "/.well-known/" path; e.g. https://example.com/.well-known/
  security.txt as per [RFC8615].

It's not really the web server putting it there, right?  It's some human, and the web server just makes it available at that path.  I suggest:

  Web-based services MUST make the security.txt file available at the
  "/.well-known/" path; e.g. https://example.com/.well-known/
  security.txt, as per [RFC8615].

Similarly:

  File systems SHOULD place the "security.txt" file under the root
  directory; e.g., "/security.txt", "C:\security.txt".

I suggest:

  The "security.txt" file SHOULD be placed in the root
  directory; e.g., "/security.txt", "C:\security.txt".

Also, why is this a SHOULD?  Why might someone put it elsewhere, and what implications does doing so have?

Section 4.3 talks about extension fields in the content, but that's part of Section 4 which talks about location of the file.  I think 4.3 belongs at 5.1 instead.
2021-01-20
10 Murray Kucherawy [Ballot Position Update] New position, Discuss, has been recorded for Murray Kucherawy
2021-01-20
10 Martin Duke [Ballot comment]
I support Roman's DISCUSS.
2021-01-20
10 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2021-01-20
10 Roman Danyliw
[Ballot discuss]
(Updated)
** The concept of operations for the file-based approach seems under-specified in a few ways:

(After reviewing the other ballot positions of …
[Ballot discuss]
(Updated)
** The concept of operations for the file-based approach seems under-specified in a few ways:

(After reviewing the other ballot positions of my peers, I believe this first item is the same issue as raise by Barry)
-- Section 3.1 says: A "security.txt" file that is found in a file system MUST only apply to the folder in which it is located and that folder's subfolders. The file does not apply to any of the folder's parent or sibling folders.

Unless I missed it, a “use the most specific directory rule” doesn’t appear to be explicitly stated and there didn’t seem to be a restriction on the number of security.txt files in a filesystem.  That is, multiple security.txt seem like they could apply.  Assume:

(1) /opt/foo/security.txt
(2) /opt/foo/bar/security.txt

Does security.txt (1) and (2) apply to /opt/foo/bar? How is one intended merge the contents of two files?

-- Is the thinking that software publisher going to package a security.txt and put it in some install directory on an end-point (like a SWID)? Or is it more likely to go into a source tar ball or seen only when you “git clone” a repo (like a README.md)?

-- If it will be in a package, is there an intent to relate any integrity protection of the overall package with the recommend openpgp practices described in this document?  If one is signature is invalid does that say anything about the other?

-- If it will be in a package, then is the guidance in Section 4.2 appropriate (File systems SHOULD place the "security.txt" file under the root directory; e.g., "/security.txt", "C:\security.txt") unless we’re assuming some container/chroot-like strategy?

-- If an end-point maintainer wants to implement a different policy, is that maintainer supposed to modify/replace the file or put another instance of that file in an alternate directory?

** Section 3.5.2. Per “The purpose of this field is to allow a digital signature to be applied to the locations of the "security.txt" file”, if a security.txt file is retrieved over https via “URL-A”, and the Canonical field does not contain URL-A, should this file be trusted?  Same with a file system directory.
2021-01-20
10 Roman Danyliw Ballot discuss text updated for Roman Danyliw
2021-01-20
10 Roman Danyliw
[Ballot discuss]
** The concept of operations for the file-based approach seems under-specified in a few ways:

-- Section 3.1 says: A "security.txt" file that …
[Ballot discuss]
** The concept of operations for the file-based approach seems under-specified in a few ways:

-- Section 3.1 says: A "security.txt" file that is found in a file system MUST only apply to the folder in which it is located and that folder's subfolders. The file does not apply to any of the folder's parent or sibling folders.

Unless I missed it, a “use the most specific directory rule” doesn’t appear to be explicitly stated and there didn’t seem to be a restriction on the number of security.txt files in a filesystem.  That is, multiple security.txt seem like they could apply.  Assume:

(1) /opt/foo/security.txt
(2) /opt/foo/bar/security.txt

Does security.txt (1) and (2) apply to /opt/foo/bar? How is one intended merge the contents of two files?

-- Is the thinking that software publisher going to package a security.txt and put it in some install directory on an end-point (like a SWID)? Or is it more likely to go into a source tar ball or seen only when you “git clone” a repo (like a README.md)?

-- If it will be in a package, is there an intent to relate any integrity protection of the overall package with the recommend openpgp practices described in this document?  If one is signature is invalid does that say anything about the other?

-- If it will be in a package, then is the guidance in Section 4.2 appropriate (File systems SHOULD place the "security.txt" file under the root directory; e.g., "/security.txt", "C:\security.txt") unless we’re assuming some container/chroot-like strategy?

-- If an end-point maintainer wants to implement a different policy, is that maintainer supposed to modify/replace the file or put another instance of that file in an alternate directory?

** Section 3.5.2. Per “The purpose of this field is to allow a digital signature to be applied to the locations of the "security.txt" file”, if a security.txt file is retrieved over https via “URL-A”, and the Canonical field does not contain URL-A, should this file be trusted?  Same with a file system directory.
2021-01-20
10 Roman Danyliw
[Ballot comment]
Thank you to Tero Kivinen for the SECDIR review.

** Terminology.  Section 1.1 cites [ISO.29147.2018] and [CERT.CVD] as the background documents for vulnerability …
[Ballot comment]
Thank you to Tero Kivinen for the SECDIR review.

** Terminology.  Section 1.1 cites [ISO.29147.2018] and [CERT.CVD] as the background documents for vulnerability management.  Those documents define a workflow and name the actors in the corresponding processes as “finders”, “reporters” and “vendors”.  This document uses the term “security researchers”, “implementers” and “organizations”.  Why use a new lexicon?  If not reuse of this lexicon, minimally, it would be helpful to explicitly map the terms used in those references to the terms used here.

** Section 3.1.  Per "security.txt" file MAY also apply to products and services provided by the organization publishing the file”, this statement confused me because this seems like the definition of the kinds of product vulnerability information described in Section 1.1.  Here it used a normative MAY too.

** Section 3.  Per “The file may also contain blank lines …”, why not a normative MAY?

** Section 3.5.*.  It would be helpful to explicitly say that unless otherwise noted, all fields are optional.  Certainly fields are explicitly noted as being mandatory, but for other the cardinality is left unsaid and implicitly assumed to be optional.

** Section 4.3.  Per “To encourage extensibility and interoperability, implementors MUST ignore any fields they do not explicitly support”, I recommend being clearer by saying it is the consumers (or reporters if you want to be consistent with the references or researchers to be consistent with the current terms) who can ignore any unrecognized fields.

** Section 6.1.  Per “Security researchers should triage  the "security.txt" file including verifying the digital signature and checking any available historical  records before using the information contained in the file”

-- I don’t follow what is being ‘triaged’ which would suggest that there is a choice to make among options?

-- what historical records are being suggested here?  Is it older versions of the security.txt file?

** Section 6.3.  Per “Organizations must use …”, should this be a normative MUST?

** Section 6.4.  Per “Implementors … may choose not to parse files larger …”, should this be a normative MAY?  Should this be restated to say that the MTI is supporting files of 32KBs and smaller?

** Section 6.5
-- Per “The presence of a security.txt file might be interpreted by researchers as providing permission to do security testing against that asset.”, the framing of security.txt as referencing an asset could be seen as an expansion of scope.  Recommend using  language consistent with what was said in Section 1 or 3 (i.e., “product” or “service”).

-- Per “Therefore, implementors shouldn't assume that presence or absence of a "security.txt" file grants or denies permission for security testing.  Any such permission may be indicated in the company's vulnerability disclosure policy (as per Section 3.5.7) or a new field (as per Section 4.3)”, if we are talking about “products”, as in packaged software, it seems uncommon to turn to vul disclosure policies (rather than EULAs) to understand what kind of testing/reverse engineering is permitted.
2021-01-20
10 Roman Danyliw [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw
2021-01-20
10 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2021-01-20
10 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2021-01-20
10 Éric Vyncke
[Ballot comment]
Thank you for the work put into this document.

I strongly second Barry's DISCUSS point on section 3.1.

Please find below some non-blocking …
[Ballot comment]
Thank you for the work put into this document.

I strongly second Barry's DISCUSS point on section 3.1.

Please find below some non-blocking COMMENT points (but replies would be appreciated).

I hope that this helps to improve the document,

Regards,

-éric

== COMMENTS ==

I am always uneasy when seeing BCP14 in an informational document...

-- Section 3.1 --
I find weird that a HTTP-retrieved security.txt applies to the whole web site while in a file system it can be applied to a sub-tree.

-- Section 3.5.4 --
Should the encryption algorithm be specified ? OpenPGP is only recommended and not specified as the only one.

-- Section 3.5.6 --
What is the motivation of the "Hiring" field ?

-- Section 3.5.7 --
Is there any recommendation for the language for the policy? Could there be multiple language fields for the policy each with one language ?

-- Section 3.5.8 --
What was the reason of not having a priority order in the list of languages ?

-- Section 4 --
It seems that section 4 repeats the content of section 3.1

-- Section 4.3 --
Why is this section (extensibility) a sub-section of section 4 (location of security.txt) ? Probably a XML mystery ;-)
2021-01-20
10 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2021-01-19
10 Barry Leiba
[Ballot discuss]
I have a few issues I’d like to get resolve before I move to “no objection”.  I think it will be an easy …
[Ballot discuss]
I have a few issues I’d like to get resolve before I move to “no objection”.  I think it will be an easy discussion and quick resolution.

— Section 3.1 —

  A "security.txt" file that is found in a file system MUST only apply
  to the folder in which it is located and that folder's subfolders.
  The file does not apply to any of the folder's parent or sibling
  folders.

You don’t say what happens if there are nested security.txt files.  What’s the scope in this situation (which file applies to folder1; which applies to folder1/subfolder)?:

/example/security.txt
/example/folder1/
/example/folder1/security.txt
/example/folder1/subfolder/

I think the document needs to make this clear.

  # This security.txt file applies to IPv4 address of 192.0.2.0.
  https://192.0.2.0/.well-known/security.txt

I’m uncomfortable with trying to restrict the scope depending upon how the file was retrieved.  If www.example.com resolves to 192.0.2.0, then it should not matter whether the file is retrieved via  or  (or via the corresponding v6 address).

— Section 3.6 —

Your examples lack the EXPIRES field that you say MUST be present.

— Section 5 —

  The expected file format of the security.txt file is plain text (MIME
  type "text/plain") as defined in section 4.1.3 of [RFC2046] and is
  encoded using UTF-8 [RFC3629] in Net-Unicode form [RFC5198].

In Section 3 you say that for HTTP:

  It MUST have a Content-Type of "text/plain" with the
  default charset parameter set to "utf-8" (as per section 4.1.3 of
  [RFC2046]).

It would be best to have the format requirement be consistent, however it’s retrieved, so “MUST” (rather than “expected”) is right, no?

The ABNF needs some work.  DISCUSS-level issues here, with less important ones below:

  signed          =  sign-header unsigned sign-footer

No, the signed body doesn’t just have a header and footer around the unsigned plain text.  A signed body would have an unsigned body, *followed by* a sign-header, a signature, and a sign-footer.

  unsigned        =  *line (contact-field eol)
                      *line (expires-field eol)
                      *line [lang-field eol] *line
                      ; order of fields within the file is not important

I found this confusing, with “*line” repeated all over the place and with “contact-field” both here and in the “field” construct, but as I worked it out I see that it’s correct (though defnitely confusing).  But while the order of the fields mostly doesn’t matter, the order of the Contact fields, if there are more than one, does matter.  So you’ll have to tweak this a bit.

Give the above, I suggest this:

  unsigned        =  *line
                      (contact-field eol) ; one or more required
                      *line
                      (expires-field eol) ; exactly one required
                      *line
                      [lang-field eol] ; exactly one optional
                      *line
                      ; order of fields within the file is not important
                      ; except that if contact-field appears more than once
                      ; the order of those indicates priority (Section 3.5.3)

  field            =  ; optional fields
                      ack-field /
                      can-field /
                      contact-field / ; optional repeated instances
                      encryption-field /
                      hiring-field /
                      policy-field /
                      ext-field

What do you think?
2021-01-19
10 Barry Leiba
[Ballot comment]
— Section 3.3 —

  Every line MUST end either with a carriage return and line feed
  characters (CRLF / %x0D %x0A) …
[Ballot comment]
— Section 3.3 —

  Every line MUST end either with a carriage return and line feed
  characters (CRLF / %x0D %x0A) or just a line feed character (LF /
  %x0A).

Why are we still allowing multiple ways to do this, these days, though it’s been shown to be problematic?  Most protocols have settles on CRLF definitively.  Why not here also?

— Section 3.5.1 —

  If this field indicates a web URL

“URI”, please, and throughout the document (I see 9 instances).

Also, you might consider just factoring that bit out to avoid repeating it, and putting into Section 3.5 something like:

  If any field indicates a web URI, that URI MUST begin with "https://"
  (as per section 2.7.2 of [RFC7230]).

— Section 3.5.5 —

Is there really value in *requiring* a sell-by date on this, and in recommending that the domain owner update this file annually or more often?  I can see that in most cases, this information would reasonably have a lifetime of years (if I’m not using fields such as “Hiring”).  I guess it’s not really a problem, as I could just ignore the RECOMMENDED and specify 31 Dec 2525, or some such [https://en.wikipedia.org/wiki/In_the_Year_2525].

— Section 3.5.8 —

  The order in which they appear MUST NOT be interpreted as an
  indication of priority - rather these MUST be interpreted as all
  being of equal priority.

This seems like an oddly heavy use of “MUST”, as there’s no interoperability issue here.  I suggest phrasing this without BCP 14 key words, as:

  The order in which they appear is not an indication of priority;
  the listed languages are intended to have equal priority.

— Section 4.1 —

  Researchers should perform additional triage

“Triage” refers to sorting into priority groups, and doesn’t seem to be the right word here.  I think “analysis” works better.

— Section 4.2 —

I can see many use cases where other mechanisms are preferable, and it might be best to talk about that.  For instance, one might prefer something like this:

/users/
/users/admin/
/users/admin/security.txt
/users/alice/
/users/carol/

Or for file systems containing product code:

/products/vendor1/
/products/vendor1/product1/
/products/vendor1/product1/security.txt
/products/vendor1/product2/
/products/vendor1/product2/security.txt
/products/company2/
/products/company2/security.txt
/products/company2/productA/
/products/company2/productB/

I’m not suggesting a lot of text here, but just something to show that the SHOULD is talking about typical situations, and that there are other valid deployments.

I’ll also note that the example in Section 3.1 violates this recommendation.

— Section 5 —

  lang-values      =  lang-tag *(*WSP "," *WSP lang-tag)

Is there really a reason to allow WSP throughout the lang-tag entries?  Why not just have them packed together, as:

  lang-values      =  lang-tag *(“,”lang-tag)

…so you have << Preferred-Languages: en,es,fr >> ?  That just seems simpler, unless there’s real value in allowing the WSP.

  uri              =  < URI as per [RFC3986] >

3986 is big; I suggest “URI imported from Section 3 of [RFC3986]” to make it easier on the reader and to be consistent with the other definitions here.

— Section 6.1 —

  Security researchers should triage the "security.txt" file including
  verifying the digital signature and checking any available historical
  records before using the information contained in the file.

As above, “triage” is not the right word.  I think “validate” works here.

— Section 6.7 —

  To protect a "security.txt" file from being tampered with in transit,
  implementors should use HTTPS (as per [RFC2818]) when serving the
  file itself

Well, this is actually a MUST (rather than “should”) earlier in the draft.  It needs to be changed to “MUST” here in order to be consistent.

  invalid certificate, additional human triage is recommended since the
  contents may have been modified while in transit.

Again, “triage” is wrong: “validation” or “analysis” here.

— Section 6.8 —

  In addition, there is an increased likelihood of
  reports being sent in an automated fashion and/or as result of
  automated scans without human triage.

Again, “triage” is wrong: “analysis” here, I think.

  Organizations need to weigh the advantages of publishing this file
  versus the possible disadvantages and increased resources required to
  triage security reports.

“analyze”

— Section 7 —

At least the first two paragraphs are unnecessary (and I’m not sure the third is useful either, but it might have some value).

— Section 7.2 —

      *  deprecated: The field is in current use, but its use is
          discouraged

I suggest, “The field has been in use, but new usage is discouraged”

Please change all “change controller” instances to “IETF”, rather than “IESG”, as that’s the IESG’s preference for declaration of change control (the IESG is an agent of the IETF community).
2021-01-19
10 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2021-01-16
10 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2021-01-15
10 Tero Kivinen Request for Telechat review by SECDIR is assigned to Tero Kivinen
2021-01-15
10 Tero Kivinen Request for Telechat review by SECDIR is assigned to Tero Kivinen
2021-01-14
10 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2021-01-13
10 Amy Vezza Placed on agenda for telechat - 2021-01-21
2021-01-12
10 Benjamin Kaduk
[Ballot comment]
Section 3.5.2

We now allow for multiple Canonical directives to be present.  I think we
should clarify that this directive is used to …
[Ballot comment]
Section 3.5.2

We now allow for multiple Canonical directives to be present.  I think we
should clarify that this directive is used to indicate that a file retrieved
from a given URL is intended to apply to that URL; it is not a direct
indication that a single file, retrieved from whatever location, applies to
all listed locations.  Some additional authority, such as a trusted PGP
signature or the ambient authority granted from retriving the file from the
listed location, is needed in order to know that the claimed canonical
location applies.

Section 3.5.3

We should s/email address is the preferred/email address security@example.com
is the preferred/ (since we now have two email addresses listed)

Section 6

Since we make heavy use of URIs pointing to remote content, we should probably
explicitly reference the URI security considerations from RFC 3986, especially
with respect to reliability and consistency
(https://tools.ietf.org/html/rfc3986#section-7.1).

Section 6.1

I think we should s/DNS-based/DNSSEC-based/, since we want there to be a
cryptographic mechanism involved in out-of-band verification of the data.

Section 7.2

We should update the initial registration for Canonical to allow multiple
appearances, as the body text now does.
2021-01-12
10 Benjamin Kaduk Ballot comment text updated for Benjamin Kaduk
2021-01-12
10 Benjamin Kaduk Ballot has been issued
2021-01-12
10 Benjamin Kaduk [Ballot Position Update] New position, Yes, has been recorded for Benjamin Kaduk
2021-01-12
10 Benjamin Kaduk Created "Approve" ballot
2021-01-12
10 Benjamin Kaduk IESG state changed to IESG Evaluation from Waiting for Writeup::AD Followup
2021-01-12
10 Benjamin Kaduk Ballot writeup was changed
2020-08-23
10 (System) Sub state has been changed to AD Followup from Revised ID Needed
2020-08-23
10 Yakov Shafranovich New version available: draft-foudil-securitytxt-10.txt
2020-08-23
10 (System) New version approved
2020-08-23
10 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2020-08-23
10 Yakov Shafranovich Uploaded new revision
2020-06-30
09 Benjamin Kaduk IESG state changed to Waiting for Writeup::Revised I-D Needed from Waiting for Writeup
2020-02-25
09 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2020-02-25
09 Yakov Shafranovich New version available: draft-foudil-securitytxt-09.txt
2020-02-25
09 (System) New version approved
2020-02-25
09 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2020-02-25
09 Yakov Shafranovich Uploaded new revision
2020-02-03
08 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events'
2020-01-19
08 Gunter Van de Velde Assignment of request for Last Call review by OPSDIR to Nagendra Kumar was marked no-response
2020-01-06
08 Amanda Baber IANA Experts State changed to Expert Reviews OK
2020-01-06
08 (System) IESG state changed to Waiting for Writeup from In Last Call
2019-12-24
08 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2019-12-24
08 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2019-12-24
08 Amanda Baber
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-foudil-securitytxt-08. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-foudil-securitytxt-08. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document.

The IANA Functions Operator understands that upon approval of this document, there are two actions to be completed.

First, in the Well-Known URIs registry located at

https://www.iana.org/assignments/well-known-uris/

a single registration is to be made as follows:

URI Suffix: security.txt
Change Controller: IETF
Reference: [ RFC-to-be ]
Status: permanent
Related Information:
Date Registered: [ TBD-at-Registration ]
Date Modified:

As this document requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK."

Second, a new registry called "security.txt Header Fields" will be created.

IANA Question --> Where should this new registry be located? Should it be added to an existing registry page? If not, does it belong in an existing category at http://www.iana.org/protocols?

IANA understands that the new registry will be managed via Expert Review as defined by [ RFC 8126 ].

There are initial registrations in the new registry:

Field Multiple Change
Name Description Appearances Status Reference Controller
-------------------+-------------------------------+------------+-----------+--------------+-----------
Acknowledgments link to page where security Yes current [ RFC-to-be ] IESG
researchers are recognized
Canonical canonical URL for this file No current [ RFC-to-be ] IESG
Contact contact information to use Yes current [ RFC-to-be ] IESG
for reporting vulnerabilities
Encryption link to a key to be used for Yes current [ RFC-to-be ] IESG
encrypted communication
Hiring link to the vendor's Yes current [ RFC-to-be ] IESG
security-related job positions
Policy link to security policy page Yes current [ RFC-to-be ] IESG
Preferred-Languages list of preferred languages No current [ RFC-to-be ] IESG
for security reports

The IANA Functions Operator understands that these are the only actions required upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

Thank you,

Amanda Baber
Lead IANA Services Specialist
2019-12-24
08 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Tero Kivinen. Sent review to list.
2019-12-17
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Nagendra Kumar
2019-12-17
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Nagendra Kumar
2019-12-16
08 Roni Even Request for Last Call review by GENART Completed: Ready. Reviewer: Roni Even. Sent review to list.
2019-12-12
08 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2019-12-12
08 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2019-12-12
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tero Kivinen
2019-12-12
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tero Kivinen
2019-12-09
08 Cindy Morgan IANA Review state changed to IANA - Review Needed
2019-12-09
08 Cindy Morgan
The following Last Call announcement was sent out (ends 2020-01-06):

From: The IESG
To: IETF-Announce
CC: Kathleen.Moriarty.ietf@gmail.com, draft-foudil-securitytxt@ietf.org, kaduk@mit.edu
Reply-To: last-call@ietf.org
Sender:
Subject: …
The following Last Call announcement was sent out (ends 2020-01-06):

From: The IESG
To: IETF-Announce
CC: Kathleen.Moriarty.ietf@gmail.com, draft-foudil-securitytxt@ietf.org, kaduk@mit.edu
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (A Method for Web Security Policies) to Informational RFC


The IESG has received a request from an individual submitter to consider the
following document: - 'A Method for Web Security Policies'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2020-01-06. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  When security vulnerabilities are discovered by independent security
  researchers, they often lack the channels to report them properly.
  As a result, security vulnerabilities may be left unreported.  This
  document defines a format ("security.txt") to help organizations
  describe the process for security researchers to follow in order to
  report security vulnerabilities.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-foudil-securitytxt/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-foudil-securitytxt/ballot/


No IPR declarations have been submitted directly on this I-D.




2019-12-09
08 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2019-12-09
08 Benjamin Kaduk Last call was requested
2019-12-09
08 Benjamin Kaduk Last call announcement was generated
2019-12-09
08 Benjamin Kaduk Ballot approval text was generated
2019-12-09
08 Benjamin Kaduk Ballot writeup was generated
2019-12-09
08 Benjamin Kaduk IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2019-12-09
08 Kathleen Moriarty
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

An AD sponsored, informational RFC is requested and is noted in the title page header.  This is a process document and as such is an appropriate choice, although it does specify a protocol and could be experimental or standards track.  The process aspect using existing standards, while defining the format for a text file, lends this more towards informational.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  When security risks are discovered by independent security
  researchers, they often lack the channels to disclose them properly.
  As a result, security issues may be left unreported.  This document
  defines a standard ("security.txt") to help organizations describe
  the process for security researchers to follow in order to disclose
  security vulnerabilities securely.

Working Group Summary

  Was the document considered in any WG, and if so, why was
  it not adopted as a work item there? Was there controversy
  about particular points that caused the WG to not adopt the
  document?

  This is an AD sponsored draft and was discussed on the SAAG mailing list.  This draft was also presented at IETF 101 in the SecDispatch session, resulting in the consensus decision that this document go forward as an AD sponsored document.  There was quite a bit of discussion on the SAAG list and all technical comments seem to have been addressed.  There was one suggestion that RDAP might be better suited, saying that if the system were to be compromised , there would be no way of noticing if the security.txt had been modified (assuming new signature is placed on the file).  Otherwise, there was agreement to publish and there was active experiments to test this process early in the draft's history.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

There are active implementations of the security.txt file that were noted by reviewers of the draft on list in addition to the UK NCSC mentioned off-list. Contributors are mentioned by way of reference to the SAAG list.  There are a few that could merit being called out specifically as they did influence some positive updates to the draft.

Personnel

  Kathleen Moriarty is the Document Shepherd.  Benjamin Kaduk is the Responsible Area
  Director.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The shepherd provided a published technical review of the draft to the SAAG list.  Once that was addressed, the shepherd checked with authors/editors on knowledge of IPR finding xxxxx.  Next the shepherd reviewed all list communication on the draft to find that all actionable comments had been addressed.  The shepherd also reached out to Paul Woulters who was in opposition to this approach to solve the problem and found he remains not in favor. https://mailarchive.ietf.org/arch/msg/saag/WoVRqcqmWdbE4mZo42XHBCKb9vg

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No, it describes a text file.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the interested community has
discussed those issues and has indicated that it still wishes to advance
the document, detail those concerns here.

See above comments from Paul Woulters.  I do not see this as a reason to block publication as he prefers a different approach to solve the problem.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Yes, both authors have confirmed they are not aware of existing IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any discussion and conclusion regarding the IPR
disclosures.

(9) How solid is the consensus of the interested community behind this
document? Does it represent the strong concurrence of a few individuals,
with others being silent, or does the interested community as a whole
understand and agree with it?

There is consensus to progress this informational document.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

One error was found, a line was too long and the editors were asked to correct this issue.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No reviews necessary.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No.

(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs
is discussed. If this information is not in the document, explain why
the interested community considers it unnecessary.

No. This document does not update any existing document.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

IANA is requested to create the "security.txt Header Fields" registry.  Additional entries require expert review.  Changes to the list of required entires requires an update to this document. There are no references to existing IANA registries.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

IANA is requested to create the "security.txt Header Fields" registry.  Additional entries require expert review.  Changes to the list of required entires requires an update to this document.

(19) Describe reviews and automated checks performed by to validate
sections of the document written in a formal language, such as XML code,
BNF rules, MIB definitions, etc.

None.

2019-11-19
08 (System) Sub state has been changed to AD Followup from Revised ID Needed
2019-11-19
08 Yakov Shafranovich New version available: draft-foudil-securitytxt-08.txt
2019-11-19
08 (System) New version approved
2019-11-19
08 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2019-11-19
08 Yakov Shafranovich Uploaded new revision
2019-09-27
07 Benjamin Kaduk IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2019-09-26
07 Benjamin Kaduk IESG state changed to AD Evaluation from Publication Requested
2019-09-26
07 Benjamin Kaduk Assigned to Security Area
2019-09-26
07 Benjamin Kaduk IESG process started in state Publication Requested
2019-09-22
07 Kathleen Moriarty Notification list changed to Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>, draft-foudil-securitytxt-all@tools.ietf.org from Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
2019-09-22
07 Kathleen Moriarty
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

An AD sponsored, informational RFC is requested and is noted in the title page header.  This is a process document and as such is an appropriate choice, although it does specify a protocol and could be experimental or standards track.  The process aspect using existing standards, while defining the format for a text file, lends this more towards informational.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  When security risks are discovered by independent security
  researchers, they often lack the channels to disclose them properly.
  As a result, security issues may be left unreported.  This document
  defines a standard ("security.txt") to help organizations describe
  the process for security researchers to follow in order to disclose
  security vulnerabilities securely.

Working Group Summary

  Was the document considered in any WG, and if so, why was
  it not adopted as a work item there? Was there controversy
  about particular points that caused the WG to not adopt the
  document?

  This is an AD sponsored draft and was discussed on the SAAG mailing list.  This draft was also presented at IETF 101 in the SecDispatch session, resulting in the consensus decision that this document go forward as an AD sponsored document.  There was quite a bit of discussion on the SAAG list and all technical comments seem to have been addressed.  There was one suggestion that RDAP might be better suited, saying that if the system were to be compromised , there would be no way of noticing if the security.txt had been modified (assuming new signature is placed on the file).  Otherwise, there was agreement to publish and there was active experiments to test this process early in the draft's history.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

There are active implementations of the security.txt file that were noted by reviewers of the draft on list. Contributors are mentioned by way of reference to the SAAG list.  There are a few that could merit being called out specifically as they did influence some positive updates to the draft.

Personnel

  Kathleen Moriarty is the Document Shepherd.  Benjamin Kaduk is the Responsible Area
  Director.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The shepherd provided a published technical review of the draft to the SAAG list.  Once that was addressed, the shepherd checked with authors/editors on knowledge of IPR finding xxxxx.  Next the shepherd reviewed all list communication on the draft to find that all actionable comments had been addressed.  The shepherd also reached out to Paul Woulters who was in opposition to this approach to solve the problem and found he remains not in favor. https://mailarchive.ietf.org/arch/msg/saag/WoVRqcqmWdbE4mZo42XHBCKb9vg

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No, it describes a text file.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the interested community has
discussed those issues and has indicated that it still wishes to advance
the document, detail those concerns here.

See above comments from Paul Woulters.  I do not see this as a reason to block publication as he prefers a different approach to solve the problem.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

Yes, both authors have confirmed they are not aware of existing IPR.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any discussion and conclusion regarding the IPR
disclosures.

(9) How solid is the consensus of the interested community behind this
document? Does it represent the strong concurrence of a few individuals,
with others being silent, or does the interested community as a whole
understand and agree with it?

There is consensus to progress this informational document.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

One error was found, a line was too long and the editors were asked to correct this issue.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No reviews necessary.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No.

(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs
is discussed. If this information is not in the document, explain why
the interested community considers it unnecessary.

No. This document does not update any existing document.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

IANA is requested to create the "security.txt Header Fields" registry.  Additional entries require expert review.  Changes to the list of required entires requires an update to this document. There are no references to existing IANA registries.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

IANA is requested to create the "security.txt Header Fields" registry.  Additional entries require expert review.  Changes to the list of required entires requires an update to this document.

(19) Describe reviews and automated checks performed by to validate
sections of the document written in a formal language, such as XML code,
BNF rules, MIB definitions, etc.

None.

2019-08-26
07 Kathleen Moriarty
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

An AD sponsored, informational RFC is requested and is noted in the title page header.  This is a process document and as such is an appropriate choice, although it does specify a protocol and could be experimental or standards track.  The process aspect using existing standards, while defining the format for a text file, lends this more towards informational.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  When security risks are discovered by independent security
  researchers, they often lack the channels to disclose them properly.
  As a result, security issues may be left unreported.  This document
  defines a standard ("security.txt") to help organizations describe
  the process for security researchers to follow in order to disclose
  security vulnerabilities securely.

Working Group Summary

  Was the document considered in any WG, and if so, why was
  it not adopted as a work item there? Was there controversy
  about particular points that caused the WG to not adopt the
  document?

  This is an AD sponsored draft and was discussed on the SAAG mailing list.  This draft was also presented at IETF 101 in the SecDispatch session, resulting in the consensus decision that this document go forward as an AD sponsored document.  There was quite a bit of discussion on the SAAG list and all technical comments seem to have been addressed.  There was one suggestion that RDAP might be better suited, saying that if the system were to be compromised , there would be no way of noticing if the security.txt had been modified (assuming new signature is placed on the file).  Otherwise, there was agreement to publish and there was active experiments to test this process early in the draft's history.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

There are active implementations of the security.txt file that were noted by reviewers of the draft on list. Contributors are mentioned by way of reference to the SAAG list.  There are a few that could merit being called out specifically as they did influence some positive updates to the draft.

Personnel

  Kathleen Moriarty is the Document Shepherd.  Benjamin Kaduk is the Responsible Area
  Director.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

The shepherd provided a published technical review of the draft to the SAAG list.  Once that was addressed, the shepherd checked with authors/editors on knowledge of IPR finding xxxxx.  Next the shepherd reviewed all list communication on the draft to find that all actionable comments had been addressed.  The shepherd also reached out to Paul Woulters who was in opposition to this approach to solve the problem and found he remains not in favor. https://mailarchive.ietf.org/arch/msg/saag/WoVRqcqmWdbE4mZo42XHBCKb9vg

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

No, it describes a text file.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the interested community has
discussed those issues and has indicated that it still wishes to advance
the document, detail those concerns here.

See above comments from Paul Woulters.  I do not see this as a reason to block publication as he prefers a different approach to solve the problem.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

xxxx

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any discussion and conclusion regarding the IPR
disclosures.

(9) How solid is the consensus of the interested community behind this
document? Does it represent the strong concurrence of a few individuals,
with others being silent, or does the interested community as a whole
understand and agree with it?

There is consensus to progress this informational document.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

No.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

One error was found, a line was too long and the editors were asked to correct this issue.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

No reviews necessary.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

No.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

No.

(16) Will publication of this document change the status of any existing
RFCs? Are those RFCs listed on the title page header, listed in the
abstract, and discussed in the introduction? If the RFCs are not listed
in the Abstract and Introduction, explain why, and point to the part of
the document where the relationship of this document to the other RFCs
is discussed. If this information is not in the document, explain why
the interested community considers it unnecessary.

No. This document does not update any existing document.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

IANA is requested to create the "security.txt Header Fields" registry.  Additional entries require expert review.  Changes to the list of required entires requires an update to this document. There are no references to existing IANA registries.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

IANA is requested to create the "security.txt Header Fields" registry.  Additional entries require expert review.  Changes to the list of required entires requires an update to this document.

(19) Describe reviews and automated checks performed by to validate
sections of the document written in a formal language, such as XML code,
BNF rules, MIB definitions, etc.

None.

2019-07-21
07 Yakov Shafranovich New version available: draft-foudil-securitytxt-07.txt
2019-07-21
07 (System) New version approved
2019-07-21
07 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2019-07-21
07 Yakov Shafranovich Uploaded new revision
2019-04-08
06 Yakov Shafranovich New version available: draft-foudil-securitytxt-06.txt
2019-04-08
06 (System) New version approved
2019-04-08
06 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2019-04-08
06 Yakov Shafranovich Uploaded new revision
2019-01-12
05 Yakov Shafranovich New version available: draft-foudil-securitytxt-05.txt
2019-01-12
05 (System) New version approved
2019-01-12
05 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2019-01-12
05 Yakov Shafranovich Uploaded new revision
2018-08-23
04 Kathleen Moriarty Changed document writeup
2018-07-16
04 Edwin Foudil New version available: draft-foudil-securitytxt-04.txt
2018-07-16
04 (System) New version approved
2018-07-16
04 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2018-07-16
04 Edwin Foudil Uploaded new revision
2018-06-21
03 Benjamin Kaduk Shepherding AD changed to Benjamin Kaduk
2018-06-21
03 Benjamin Kaduk Notification list changed to Kathleen Moriarty <Kathleen.Moriarty.ietf@gmail.com>
2018-06-21
03 Benjamin Kaduk Document shepherd changed to Kathleen Moriarty
2018-06-21
03 Benjamin Kaduk Stream changed to IETF from None
2018-03-09
03 Roman Danyliw Added to session: IETF-101: secdispatch  Tue-0930
2018-02-09
03 Edwin Foudil New version available: draft-foudil-securitytxt-03.txt
2018-02-09
03 (System) New version approved
2018-02-09
03 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil , Yakov Shafranovich
2018-02-09
03 Edwin Foudil Uploaded new revision
2017-12-27
02 Edwin Foudil New version available: draft-foudil-securitytxt-02.txt
2017-12-27
02 (System) New version approved
2017-12-27
02 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil
2017-12-27
02 Edwin Foudil Uploaded new revision
2017-12-03
01 Edwin Foudil New version available: draft-foudil-securitytxt-01.txt
2017-12-03
01 (System) New version approved
2017-12-03
01 (System) Request for posting confirmation emailed to previous authors: Edwin Foudil
2017-12-03
01 Edwin Foudil Uploaded new revision
2017-09-19
00 Nevil Brownlee Stream changed to None from ISE
2017-09-13
00 Nevil Brownlee Intended Status changed to Informational from None
2017-09-13
00 Nevil Brownlee Stream changed to ISE from None
2017-09-10
00 Edwin Foudil New version available: draft-foudil-securitytxt-00.txt
2017-09-10
00 (System) New version approved
2017-09-10
00 Edwin Foudil Request for posting confirmation emailed  to submitter and authors: Edwin Foudil
2017-09-10
00 Edwin Foudil Uploaded new revision