From 4af072da37760a1ea331b03fb8c181d9da980e94 Mon Sep 17 00:00:00 2001 From: Stefan Fritsch Date: Fri, 5 Oct 2007 21:35:05 +0000 Subject: start to update the website git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@6809 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- website/index.html | 235 ++++++++++++++++++------------------------------- website/uploading.html | 94 ++++++++++++++++++++ 2 files changed, 181 insertions(+), 148 deletions(-) create mode 100644 website/uploading.html (limited to 'website') diff --git a/website/index.html b/website/index.html index 09819260aa..e94860d339 100644 --- a/website/index.html +++ b/website/index.html @@ -39,172 +39,111 @@

The Debian testing security team is a group of Debian developers - and users who are working to improve the state of security in - Debian's testing branch. Lack of security support for testing has - long been one of the key problems to using testing, and we aim to - eventually provide full security support for testing. + and users who are working to keep Debian's testing branch in good + shape with respect to security. Since packages migrate to testing + from Debian's unstable branch, a secondary goal of the team is to + improve the state of security in unstable.

+ -

Activities

+

Security Tracker

- The team's first activity was to check all security holes since the - release of Debian 3.0, to ensure that all the holes are fixed in - sarge and to provide a baseline for future work. + The team is tracking new security holes on an ongoing basis, making sure + maintainers are informed of them and filing bug reports in the + Debian BTS. The result of this work is availably in the + Security Tracker web page. + This tracker contains information about all branches of Debian and is also + used by the stable security team.

-

- Now the team is tracking new holes on an ongoing basis, making sure - maintainers are informed of them and that there are bugs in the - Debian BTS, writing patches and doing NMUs as necessary, and - tracking the fixed packages and working with the Debian Release - Managers to make sure fixes reach testing quickly. Thanks to this - work we now have - a - web page, that tracks open security holes in testing and other - branches of Debian. -

+

Security support for testing

-

- The team is in the process of beginning full security support for - testing by providing security advisories and fixes built against - testing without the usual delays sometimes involved in getting a - security fix into testing. These will be announced on the - secure-testing-announce@lists.alioth.debian.org - mailing list, and will be available in the following apt - repository: -

-	 deb http://security.debian.org lenny/updates main contrib non-free
-	 deb-src http://security.debian.org lenny/updates main contrib non-free
-	
- These are also available from this list.
+

The team is providing security support for Debian's testing branch by

-

Data sources

+ + +

Note that in order to take advantage of the security support for testing, + you must update your system on a regular basis.

+ +

Limitations

-

- To issue a DTSA, team members follow this checklist (note: this may change once newamber is fixed to use our templates): -

    -
  1. Commit an initial .adv template into SVN to prevent duplicate work and claim an advisory number -
  2. Prepare the update and fill out the .adv template -
  3. Make sure everything is ready. -
  4. cd data/DTSA; ./dtsa -p ADVISORYNUMBER
  5. -
  6. check DTSA-n-1 and DTSA-n-1.html. Remove TODO line for - advisory from the list file
  7. -
  8. mv DTSA-n-1.html ../../website/DTSA/
  9. -
  10. cd ../../website; ../bin/updatehtmllist --output list.html ../data/DTSA/list
  11. -
  12. cd ../; svn add website/DTSA/DTSA-n-1.html; svn commit
  13. -
  14. cd data/DTSA; ./sndadvisory DTSA-n-1
  15. -
  16. Edit CVE/list and DTSA/list to list the version of the - package that is in the secure-testing archive as fixing the - holes. This is unfortunately currently necessary for the fix to - appear as a fix on the tracking page.
  17. -
+

For several reasons, the security support for testing cannot be expected to + be of the same quality as for Debian's stable branch:

+ + + +

Announcements

-

Members and contacting the team

+

Daily notifications about fixed security issues are sent to the + secure-testing-announce@lists.alioth.debian.org + mailing list.

+ +

Contacting the team

+ +

To contact the team, use

+ + +

For issues related to the Debian security tracker, use the

+ + -

- While some individual members may have sources of prior information - about security advisories (such as vendor-sec), the team as a whole - operates only on publicly available information. Any Debian - developers with an interest in participating are welcome to join - the team, and we also welcome others who have the skills and desire - to help us.

+

More information

+ + + -

- The team can be contacted through its mailing list, - secure-testing-team@lists.alioth.debian.org. Please note that this is a public list, and as such, you should not send details of undisclosed vulnerabilities to this address. - Our irc channel is #debian-security on the OFTC network. - There is a second mailing list, - secure-testing-commits@lists.alioth.debian.org - that receives commit messages to our repository, new team members - are encouraged to join it. - The list - secure-testing-changes@lists.alioth.debian.org - receives automatic annoucements of fixed packages uploaded to our - repository. - An alioth - project page is also available. -


$Id$

diff --git a/website/uploading.html b/website/uploading.html new file mode 100644 index 0000000000..41cf304955 --- /dev/null +++ b/website/uploading.html @@ -0,0 +1,94 @@ + + + Uploading to testing-security + + + + +
+ + + + + Debian Project +
+
+ + + + + + + + + + + +
+ Debian testing security team +
+ + +
+ +

+ To upload a package to the secure-testing repository, any Debian + developer may follow this checklist: +

    +
  1. Only upload changes that have already been made in + unstable and are blocked by reaching testing by some other + issues. This is both to keep things in sync once the + new version from unstable reaches testing, and to avoid + breaking secure-testing too badly with fixes that have not + been tested first in unstable.
  2. +
  3. If the orig.tar.gz is already on security.debian.org + (either in stable-security or in testing-security) + don't include it in the upload. If in doubt, ask the team.
  4. +
  5. Contact the team first to avoid duplicate work.
  6. +
  7. Use a version number that is less than the version + number of the fix in unstable, but greater than the version + number of the fix in testing (including a possible +b1 for binNMUs). + For example, if the fix is in a new upstream version 1.0-1 in unstable, + upload version 1.0-1~lenny1 to testing-security. If the current version + in testing is 1.2-3 and the fix is backported to this version, upload + version 1.2-3+lenny1 to testing-security.
  8. +
  9. Use "testing-security" as the distribution in the + changelog.
  10. +
  11. Build the package in a testing chroot using pbuilder + so that all the dependencies are ok. Be sure to build with + the -sa switch to include source, unless the source is + already in the testing-security archive. +
  12. +
  13. Test the package. Diff the package against the version + in testing (if backporting fixes). Use debdiff on both + source and binary packages.
  14. +
  15. Sign the package. Any Debian developer in the keyring + can do so.
  16. +
  17. Upload to security-master.debian.org. + Here is a dput.cf snippet for that upload queue: +
    +		[testing-security]
    +		fqdn = security-master.debian.org
    +		method = ftp
    +		incoming = /pub/OpenSecurityUploadQueue/
    +		login = anonymous
    +		
    + Note that this is not the same queue as usually used for stable security. +
  18. +
+ + + +

$Id: index.html 6493 2007-09-04 11:06:04Z nion $

+ + Valid HTML 4.01! + + Valid CSS! + + + -- cgit v1.2.3