rfc9116.original.xml | rfc9116.xml | |||
---|---|---|---|---|
<?xml version='1.0' encoding='utf-8'?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?> | ||||
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 --> | <!DOCTYPE rfc [ | |||
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent"> | <!ENTITY nbsp " "> | |||
<?rfc sortrefs="yes"?> | <!ENTITY zwsp "​"> | |||
<?rfc strict="yes"?> | <!ENTITY nbhy "‑"> | |||
<?rfc symrefs="yes"?> | <!ENTITY wj "⁠"> | |||
<?rfc toc="yes"?> | ]> | |||
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | ||||
-foudil-securitytxt-13" category="info" obsoletes="" updates="" submissionType=" | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft | |||
IETF" xml:lang="en" sortRefs="true" symRefs="true" tocInclude="true" version="3" | -foudil-securitytxt-12" number="9116" obsoletes="" updates="" submissionType="IE | |||
> | TF" category="info" consensus="true" xml:lang="en" sortRefs="true" symRefs="true | |||
<!-- xml2rfc v2v3 conversion 3.5.0 --> | " tocInclude="true" | |||
version="3"> | ||||
<front> | <front> | |||
<title abbrev="security.txt">A File Format to Aid in Security Vulnerability Disclosure</title> | <title abbrev="security.txt">A File Format to Aid in Security Vulnerability Disclosure</title> | |||
<seriesInfo name="Internet-Draft" value="draft-foudil-securitytxt-13"/> | <seriesInfo name="RFC" value="9116"/> | |||
<author initials="E." surname="Foudil" fullname="Edwin Foudil"> | <author initials="E." surname="Foudil" fullname="Edwin Foudil"> | |||
<organization/> | <organization/> | |||
<address> | <address> | |||
<email>contact@edoverflow.com</email> | <email>contact@edoverflow.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author initials="Y." surname="Shafranovich" fullname="Yakov Shafranovich"> | <author initials="Y." surname="Shafranovich" fullname="Yakov Shafranovich"> | |||
<organization>Nightwatch Cybersecurity</organization> | <organization>Nightwatch Cybersecurity</organization> | |||
<address> | <address> | |||
<email>yakov+ietf@nightwatchcybersecurity.com</email> | <email>yakov+ietf@nightwatchcybersecurity.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date year="2021" month="July" day="11"/> | <date year="2022" month="April"/> | |||
<abstract> | <abstract> | |||
<t>When security vulnerabilities are discovered by | <t>When security vulnerabilities are discovered by | |||
researchers, proper reporting channels are often lacking. As a result, | researchers, proper reporting channels are often lacking. As a result, | |||
vulnerabilities may be left unreported. This document defines a machine-parsable format | vulnerabilities may be left unreported. This document defines a machine-parsable format | |||
("security.txt") to help organizations describe their vulnerability disclosure p ractices | ("security.txt") to help organizations describe their vulnerability disclosure p ractices | |||
to make it easier for researchers to report vulnerabilities.</t> | to make it easier for researchers to report vulnerabilities.</t> | |||
</abstract> | </abstract> | |||
</front> | </front> | |||
<middle> | <middle> | |||
<section anchor="introduction" numbered="true" toc="default"> | <section anchor="introduction" numbered="true" toc="default"> | |||
<name>Introduction</name> | <name>Introduction</name> | |||
<section anchor="motivation" numbered="true" toc="default"> | <section anchor="motivation" numbered="true" toc="default"> | |||
<name>Motivation, Prior Work and Scope</name> | <name>Motivation, Prior Work, and Scope</name> | |||
<t>Many security researchers encounter situations where they are unable | <t>Many security researchers encounter situations where they are unable | |||
to report security vulnerabilities to organizations because there are | to report security vulnerabilities to organizations because there are | |||
no reporting channels to contact the owner of a particular | no reporting channels to contact the owner of a particular | |||
resource and no information available about the vulnerability disclosure practic es | resource, and no information is available about the vulnerability disclosure pra ctices | |||
of such owner.</t> | of such owner.</t> | |||
<t>As per section 4 of <xref target="RFC2142" format="default"/>, there is an existing convention | <t>As per <xref target="RFC2142" section="4" sectionFormat="of"/>, there is an existing convention | |||
of using the <SECURITY@domain> email address for communications regarding | of using the <SECURITY@domain> email address for communications regarding | |||
security issues. That convention provides only a single, email-based | security issues. That convention provides only a single, email-based | |||
channel of communication per domain, and does not provide | channel of communication per domain and does not provide | |||
a way for domain owners to publish information about their security disclosure | a way for domain owners to publish information about their security disclosure | |||
practices.</t> | practices.</t> | |||
<t>There are also contact conventions prescribed for Internet Service Pr oviders (ISPs) | <t>There are also contact conventions prescribed for Internet Service Pr oviders (ISPs) | |||
in section 2 of <xref target="RFC3013" format="default"/>, for Computer Security | in <xref target="RFC3013" section="2" sectionFormat="of"/>, for Computer Securit | |||
Incident Response Teams (CSIRTs) | y Incident Response Teams (CSIRTs) | |||
in section 3.2 of <xref target="RFC2350" format="default"/> and for site operato | in <xref target="RFC2350" section="3.2" sectionFormat="of"/>, and for site opera | |||
rs in section 5.2 of | tors in <xref target="RFC2196" section="5.2" sectionFormat="of"/>. As per <xref | |||
<xref target="RFC2196" format="default"/>. As per <xref target="RFC7485" format= | target="RFC7485" format="default"/>, there is also contact information provided | |||
"default"/>, there is also contact information provided by | by | |||
Regional Internet Registries (RIRs) and domain registries for owners of IP | Regional Internet Registries (RIRs) and domain registries for owners of IP | |||
addresses, autonomous system numbers (ASNs), and domain names. However, none of | addresses, Autonomous System Numbers (ASNs), and domain names. However, none of | |||
these tackle the issue of how security researchers can locate contact informatio n | these tackle the issue of how security researchers can locate contact informatio n | |||
and vulnerability disclosure practices for organizations in order to report | and vulnerability disclosure practices for organizations in order to report | |||
vulnerabilities.</t> | vulnerabilities.</t> | |||
<t>In this document, we define a richer, machine-parsable and more exten sible way | <t>In this document, we define a richer, machine-parsable, and more exte nsible way | |||
for organizations to communicate information about their security disclosure | for organizations to communicate information about their security disclosure | |||
practices and ways to contact them. Other details of vulnerability disclosure | practices and ways to contact them. Other details of vulnerability disclosure | |||
are outside the scope of this document. Readers are encouraged to consult other | are outside the scope of this document. Readers are encouraged to consult other | |||
documents such as <xref target="ISO.29147.2018" format="default"/> or <xref targ et="CERT.CVD" format="default"/>.</t> | documents such as <xref target="ISO.29147.2018" format="default"/> or <xref targ et="CERT.CVD" format="default"/>.</t> | |||
<t>As per <xref target="CERT.CVD" format="default"/>, "vulnerability res | <t>As per <xref target="CERT.CVD" format="default"/>, "vulnerability res | |||
ponse" refers to reports of product vulnerabilities | ponse" refers to reports of product vulnerabilities, | |||
which is related but distinct from reports of network intrusions and compromised | which is related to but distinct from reports of network intrusions and compromi | |||
sed | ||||
websites ("incident response"). The mechanism defined in this document is intend ed | websites ("incident response"). The mechanism defined in this document is intend ed | |||
to be used for the former ("vulnerability response"). If implementors want | to be used for the former ("vulnerability response"). If implementors want | |||
to utilize this mechanism for incident response, they should be aware of additio nal | to utilize this mechanism for incident response, they should be aware of additio nal | |||
security considerations discussed in <xref target="compromise" format="default"/ >.</t> | security considerations discussed in <xref target="compromise" format="default"/ >.</t> | |||
<t>The "security.txt" file is intended to be complementary and not as a substitute | <t>The "security.txt" file is intended to be complementary and not a sub stitute | |||
or replacement for other public resources maintained by organizations regarding | or replacement for other public resources maintained by organizations regarding | |||
their security disclosure practices.</t> | their security disclosure practices.</t> | |||
</section> | </section> | |||
<section anchor="terminology" numbered="true" toc="default"> | <section anchor="terminology" numbered="true" toc="default"> | |||
<name>Terminology</name> | <name>Terminology</name> | |||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | 14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", | |||
"OPTIONAL" in this document are to be interpreted as described in | "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14 | |||
BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format=" | >", "<bcp14>NOT RECOMMENDED</bcp14>", "<bcp14>MAY</bcp14>", and | |||
default"/> when, and only when, they appear in all | "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as described in | |||
capitals, as shown here.</t> | BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format=" | |||
default"/> when, and only when, they appear in all capitals, as shown here.</t> | ||||
<t>The term "researcher" corresponds | <t>The term "researcher" corresponds | |||
to the terms "finder" and "reporter" in <xref target="ISO.29147.2018" format="de fault"/> and <xref target="CERT.CVD" format="default"/>. | to the terms "finder" and "reporter" in <xref target="ISO.29147.2018" format="de fault"/> and <xref target="CERT.CVD" format="default"/>. | |||
The term "organization" corresponds to the term "vendor" | The term "organization" corresponds to the term "vendor" | |||
in <xref target="ISO.29147.2018" format="default"/> and <xref target="CERT.CVD" format="default"/>.</t> | in <xref target="ISO.29147.2018" format="default"/> and <xref target="CERT.CVD" format="default"/>.</t> | |||
<t>The term "implementors" includes all parties involved in | <t>The term "implementors" includes all parties involved in | |||
the vulnerability disclosure process.</t> | the vulnerability disclosure process.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="note-to-readers" numbered="true" toc="default"> | ||||
<name>Note to Readers</name> | ||||
<ul empty="true" spacing="normal"> | ||||
<li> | ||||
<strong>Note to the RFC Editor:</strong> Please remove this section p | ||||
rior | ||||
to publication.</li> | ||||
</ul> | ||||
<t>Development of this draft takes place on Github at: https://github.com/ | ||||
securitytxt/security-txt</t> | ||||
</section> | ||||
<section anchor="the-specification" numbered="true" toc="default"> | <section anchor="the-specification" numbered="true" toc="default"> | |||
<name>The Specification</name> | <name>The Specification</name> | |||
<t>This document defines a text file to be placed in a known location | <t>This document defines a text file to be placed in a known location | |||
that provides information about vulnerability disclosure practices of a particul ar organization. | that provides information about vulnerability disclosure practices of a particul ar organization. | |||
The format of this file is machine-parsable and MUST follow the ABNF grammar def ined in | The format of this file is machine parsable and <bcp14>MUST</bcp14> follow the A BNF grammar defined in | |||
<xref target="abnf" format="default"/>. This file is intended to help security r esearchers when | <xref target="abnf" format="default"/>. This file is intended to help security r esearchers when | |||
disclosing security vulnerabilities.</t> | disclosing security vulnerabilities.</t> | |||
<t>By convention, the file is named "security.txt". Location and scope are described | <t>By convention, the file is named "security.txt". The location and scope are described | |||
in <xref target="location" format="default"/>.</t> | in <xref target="location" format="default"/>.</t> | |||
<t>This text file contains multiple fields with different values. A field | <t>This text file contains multiple fields with different values. A field | |||
contains a "name" which is the first part of a field all the way up | contains a "name", which is the first part of a field all the way up | |||
to the colon (for example: "Contact:") and follows the syntax defined for "field | to the colon (for example: "Contact:") and follows the syntax defined for "field | |||
-name" in section 3.6.8 | -name" in <xref target="RFC5322" section="3.6.8" sectionFormat="of"/>. Field nam | |||
of <xref target="RFC5322" format="default"/>. Field names are case-insensitive ( | es are case insensitive (as per <xref target="RFC5234" section="2.3" sectionForm | |||
as per section 2.3 of <xref target="RFC5234" format="default"/>). | at="of"/>). | |||
The "value" comes after the field name (for example: "mailto:security@example.co m") and follows the syntax | The "value" comes after the field name (for example: "mailto:security@example.co m") and follows the syntax | |||
defined for "unstructured" in section 3.2.5 of <xref target="RFC5322" format="de | defined for "unstructured" in <xref target="RFC5322" section="3.2.5" sectionForm | |||
fault"/>. The file MAY also contain blank lines.</t> | at="of"/>. The file <bcp14>MAY</bcp14> also contain blank lines.</t> | |||
<t>A field MUST always consist of a name and a value | <t>A field <bcp14>MUST</bcp14> always consist of a name and a value | |||
(for example: "Contact: mailto:security@example.com"). A "security.txt" file | (for example: "Contact: mailto:security@example.com"). A "security.txt" file | |||
can have an unlimited number of fields. Each field MUST appear on | can have an unlimited number of fields. Each field <bcp14>MUST</bcp14> appear on | |||
its own line. Unless specified otherwise by the field definition, | its own line. Unless otherwise specified by the field definition, | |||
multiple values MUST NOT be chained together for a single field. | multiple values <bcp14>MUST NOT</bcp14> be chained together for a single field. | |||
Unless otherwise indicated in a definition of a particular field, a field MAY ap | Unless otherwise indicated in a definition of a particular field, a field <bcp14 | |||
pear | >MAY</bcp14> appear | |||
multiple times.</t> | multiple times.</t> | |||
<t>Implementors should be aware that some of the fields may | <t>Implementors should be aware that some of the fields may | |||
contain URIs using percent-encoding (as per section 2.1 of <xref target="RFC3986 " format="default"/>).</t> | contain URIs using percent-encoding (as per <xref target="RFC3986" section="2.1" sectionFormat="of"/>).</t> | |||
<section anchor="comments" numbered="true" toc="default"> | <section anchor="comments" numbered="true" toc="default"> | |||
<name>Comments</name> | <name>Comments</name> | |||
<t>Any line beginning with the "#" (%x23) symbol MUST be interpreted as | <t>Any line beginning with the "#" (%x23) symbol <bcp14>MUST</bcp14> be | |||
a comment. | interpreted as a comment. The content of the comment may contain any ASCII or Un | |||
The content of the comment may contain any ASCII or Unicode characters in the | icode characters in the | |||
%x21-7E and %x80-FFFFF ranges plus the tab (%x09) and space (%x20) characters.</ | %x21-7E and %x80-FFFFF ranges plus the tab (%x09) and space (%x20) charac | |||
t> | ters.</t> | |||
<t>Example:</t> | <t>Example:</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
# This is a comment. | # This is a comment. | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="line-separator" numbered="true" toc="default"> | <section anchor="line-separator" numbered="true" toc="default"> | |||
<name>Line Separator</name> | <name>Line Separator</name> | |||
<t>Every line MUST end either with a carriage return and line feed | <t>Every line <bcp14>MUST</bcp14> end with either a carriage return and line feed | |||
characters (CRLF / %x0D %x0A) or just a line feed character (LF / %x0A).</t> | characters (CRLF / %x0D %x0A) or just a line feed character (LF / %x0A).</t> | |||
</section> | </section> | |||
<section anchor="signature" numbered="true" toc="default"> | <section anchor="signature" numbered="true" toc="default"> | |||
<name>Digital signature</name> | <name>Digital Signature</name> | |||
<t>It is RECOMMENDED that a "security.txt" file be digitally signed | <t>It is <bcp14>RECOMMENDED</bcp14> that a "security.txt" file be digita | |||
using an OpenPGP cleartext signature as described in | lly signed | |||
section 7 of <xref target="RFC4880" format="default"/>. When digital signatures | using an OpenPGP cleartext signature as described in <xref target="RFC4880" sect | |||
are used, it is also | ion="7" sectionFormat="of"/>. When digital signatures are used, it is also | |||
RECOMMENDED that organizations use the "Canonical" field (as per <xref target="c | <bcp14>RECOMMENDED</bcp14> that organizations use the "Canonical" field (as per | |||
anonical" format="default"/>), | <xref target="canonical" format="default"/>), | |||
thus allowing the digital signature to authenticate the location of the file.</t > | thus allowing the digital signature to authenticate the location of the file.</t > | |||
<t>When it comes to verifying the key used to generate the signature, it is always | <t>When it comes to verifying the key used to generate the signature, it is always | |||
the security researcher's responsibility to make sure the key being | the security researcher's responsibility to make sure the key being | |||
used is indeed one they trust.</t> | used is indeed one they trust.</t> | |||
</section> | </section> | |||
<section anchor="extensibility" numbered="true" toc="default"> | <section anchor="extensibility" numbered="true" toc="default"> | |||
<name>Extensibility</name> | <name>Extensibility</name> | |||
<t>Like many other formats and protocols, this format may need to be ext ended | <t>Like many other formats and protocols, this format may need to be cha nged | |||
over time to fit the ever-changing landscape of the Internet. Therefore, | over time to fit the ever-changing landscape of the Internet. Therefore, | |||
extensibility is provided via an IANA registry for fields as defined | extensibility is provided via an IANA registry for fields as defined | |||
in <xref target="registry" format="default"/>. Any fields registered via that pr ocess MUST be | in <xref target="registry" format="default"/>. Any fields registered via that pr ocess <bcp14>MUST</bcp14> be | |||
considered optional. To encourage extensibility and interoperability, | considered optional. To encourage extensibility and interoperability, | |||
researchers MUST ignore any fields they do not explicitly support.</t> | researchers <bcp14>MUST</bcp14> ignore any fields they do not explicitly support .</t> | |||
<t>In general, implementors should "be conservative in what you do, | <t>In general, implementors should "be conservative in what you do, | |||
be liberal in what you accept from others" (as per <xref target="RFC0793" format ="default"/>).</t> | be liberal in what you accept from others" (as per <xref target="RFC0793" format ="default"/>).</t> | |||
</section> | </section> | |||
<section anchor="field-definitions" numbered="true" toc="default"> | <section anchor="field-definitions" numbered="true" toc="default"> | |||
<name>Field Definitions</name> | <name>Field Definitions</name> | |||
<t>Unless otherwise stated, all fields MUST be considered optional.</t> | <t>Unless otherwise stated, all fields <bcp14>MUST</bcp14> be considered optional.</t> | |||
<section anchor="acknowledgments" numbered="true" toc="default"> | <section anchor="acknowledgments" numbered="true" toc="default"> | |||
<name>Acknowledgments</name> | <name>Acknowledgments</name> | |||
<t>This field indicates a link to a page where security | ||||
<t>The "Acknowledgments" field indicates a link to a page where securi | ||||
ty | ||||
researchers are recognized for their reports. The page being referenced | researchers are recognized for their reports. The page being referenced | |||
should list security researchers that reported security vulnerabilities | should list security researchers that reported security vulnerabilities | |||
and collaborated to remediate them. Organizations should be careful | and collaborated to remediate them. Organizations should be careful | |||
to limit the vulnerability information being published in order | to limit the vulnerability information being published in order | |||
to prevent future attacks.</t> | to prevent future attacks.</t> | |||
<t>If this field indicates a web URI, then it MUST begin with "https:/ | <t>If this field indicates a web URI, then it <bcp14>MUST</bcp14> begi | |||
/" | n with "https://" | |||
(as per section 2.7.2 of <xref target="RFC7230" format="default"/>).</t> | (as per <xref target="RFC7230" section="2.7.2" sectionFormat="of"/>).</t> | |||
<t>Example:</t> | <t>Example:</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Acknowledgments: https://example.com/hall-of-fame.html | Acknowledgments: https://example.com/hall-of-fame.html | |||
]]></artwork> | ]]></artwork> | |||
<t>Example security acknowledgments page:</t> | <t>Example security acknowledgments page:</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
We would like to thank the following researchers: | We would like to thank the following researchers: | |||
(2017-04-15) Frank Denis - Reflected cross-site scripting | (2017-04-15) Frank Denis - Reflected cross-site scripting | |||
(2017-01-02) Alice Quinn - SQL injection | (2017-01-02) Alice Quinn - SQL injection | |||
(2016-12-24) John Buchner - Stored cross-site scripting | (2016-12-24) John Buchner - Stored cross-site scripting | |||
(2016-06-10) Anna Richmond - A server configuration issue | (2016-06-10) Anna Richmond - A server configuration issue | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="canonical" numbered="true" toc="default"> | <section anchor="canonical" numbered="true" toc="default"> | |||
<name>Canonical</name> | <name>Canonical</name> | |||
<t>This field indicates the canonical URIs where the "security.txt" fi le is located, | <t>The "Canonical" field indicates the canonical URIs where the "secur ity.txt" file is located, | |||
which is usually something like "https://example.com/.well-known/security.txt". | which is usually something like "https://example.com/.well-known/security.txt". | |||
If this field indicates a web URI, then it MUST begin with "https://" | If this field indicates a web URI, then it <bcp14>MUST</bcp14> begin with "https | |||
(as per section 2.7.2 of <xref target="RFC7230" format="default"/>).</t> | ://" | |||
(as per <xref target="RFC7230" section="2.7.2" sectionFormat="of"/>).</t> | ||||
<t>While this field indicates that a "security.txt" retrieved from a g iven URI | <t>While this field indicates that a "security.txt" retrieved from a g iven URI | |||
is intended to apply to that URI, it MUST NOT be interpreted to apply to | is intended to apply to that URI, it <bcp14>MUST NOT</bcp14> be interpreted to a | |||
all canonical URIs listed within the file. Researchers SHOULD use an additional | pply to | |||
all canonical URIs listed within the file. Researchers <bcp14>SHOULD</bcp14> use | ||||
an additional | ||||
trust mechanism such as a digital signature (as per <xref target="signature" for mat="default"/>) to make the | trust mechanism such as a digital signature (as per <xref target="signature" for mat="default"/>) to make the | |||
determination that a particular canonical URI is applicable.</t> | determination that a particular canonical URI is applicable.</t> | |||
<t>If this field appears within a "security.txt" file, and the URI use d to | <t>If this field appears within a "security.txt" file and the URI used to | |||
retrieve that file is not listed within any canonical fields, | retrieve that file is not listed within any canonical fields, | |||
then the contents of the file SHOULD NOT be trusted.</t> | then the contents of the file <bcp14>SHOULD NOT</bcp14> be trusted.</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Canonical: https://www.example.com/.well-known/security.txt | Canonical: https://www.example.com/.well-known/security.txt | |||
Canonical: https://someserver.example.com/.well-known/security.txt | Canonical: https://someserver.example.com/.well-known/security.txt | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="contact" numbered="true" toc="default"> | <section anchor="contact" numbered="true" toc="default"> | |||
<name>Contact</name> | <name>Contact</name> | |||
<t>This field indicates an address that researchers | <t>The "Contact" field indicates a method that researchers | |||
should use for reporting security | should use for reporting security | |||
vulnerabilities such as an email address, a phone number and/or a | vulnerabilities such as an email address, a phone number, and/or a | |||
web page with contact information. The "Contact" field MUST | web page with contact information. This field <bcp14>MUST</bcp14> | |||
always be present in a "security.txt" file. If this field indicates a web URI, | always be present in a "security.txt" file. If this field indicates a web URI, | |||
then it MUST begin with "https://" (as per section 2.7.2 of <xref target="RFC723 | then it <bcp14>MUST</bcp14> begin with "https://" (as per <xref target="RFC7230" | |||
0" format="default"/>). | section="2.7.2" sectionFormat="of"/>). | |||
Security email addresses should use the conventions defined in section | Security email addresses should use the conventions defined in <xref target="RFC | |||
4 of <xref target="RFC2142" format="default"/>.</t> | 2142" section="4" sectionFormat="of"/>.</t> | |||
<t>The value MUST follow the URI syntax described in section 3 of <xre | <t>The value <bcp14>MUST</bcp14> follow the URI syntax described in <x | |||
f target="RFC3986" format="default"/>. | ref target="RFC3986" section="3" sectionFormat="of"/>. | |||
This means that "mailto" and "tel" URI schemes must be used | This means that "mailto" and "tel" URI schemes must be used | |||
when specifying email addresses and telephone numbers, as defined in <xref targe t="RFC6068" format="default"/> | when specifying email addresses and telephone numbers, as defined in <xref targe t="RFC6068" format="default"/> | |||
and <xref target="RFC3966" format="default"/>. When the value of this field is a n email address, | and <xref target="RFC3966" format="default"/>. When the value of this field is a n email address, | |||
it is RECOMMENDED that encryption be used (as per <xref target="encryption" form | it is <bcp14>RECOMMENDED</bcp14> that encryption be used (as per <xref | |||
at="default"/>).</t> | target="encryption" format="default"/>).</t> | |||
<t>The precedence SHOULD be in listed order. The first occurrence is t | ||||
he preferred | <t>These <bcp14>SHOULD</bcp14> be listed in order of preference, with | |||
method of contact. In the example below, the first email address | the first occurrence being the preferred | |||
method of contact, the second occurrence being the second most preferred method | ||||
of contact, etc. In the example below, the first email address | ||||
("security@example.com") is the preferred method of contact.</t> | ("security@example.com") is the preferred method of contact.</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Contact: mailto:security@example.com | Contact: mailto:security@example.com | |||
Contact: mailto:security%2Buri%2Bencoded@example.com | Contact: mailto:security%2Buri%2Bencoded@example.com | |||
Contact: tel:+1-201-555-0123 | Contact: tel:+1-201-555-0123 | |||
Contact: https://example.com/security-contact.html | Contact: https://example.com/security-contact.html | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="encryption" numbered="true" toc="default"> | <section anchor="encryption" numbered="true" toc="default"> | |||
<name>Encryption</name> | <name>Encryption</name> | |||
<t>This field indicates an encryption key that | <t>The "Encryption" field indicates an encryption key that | |||
security researchers should use for encrypted communication. Keys MUST NOT | security researchers should use for encrypted communication. Keys <bcp14>MUST NO | |||
appear in this field - instead the value of this field | T</bcp14> | |||
MUST be a URI pointing to a location where the key can be retrieved. | appear in this field. Instead, the value of this field | |||
If this field indicates a web URI, then it MUST begin with "https://" | <bcp14>MUST</bcp14> be a URI pointing to a location where the key can be retriev | |||
(as per section 2.7.2 of <xref target="RFC7230" format="default"/>).</t> | ed. | |||
If this field indicates a web URI, then it <bcp14>MUST</bcp14> begin with "https | ||||
://" | ||||
(as per <xref target="RFC7230" section="2.7.2" sectionFormat="of"/>).</t> | ||||
<t>When it comes to verifying the authenticity of the key, it is alway s the security | <t>When it comes to verifying the authenticity of the key, it is alway s the security | |||
researcher's responsibility to make sure the key being specified is indeed one | researcher's responsibility to make sure the key being specified is indeed one | |||
they trust. Researchers must not assume that this key is | they trust. Researchers must not assume that this key is | |||
used to generate the digital signature referenced in <xref target="signature" fo rmat="default"/>.</t> | used to generate the digital signature referenced in <xref target="signature" fo rmat="default"/>.</t> | |||
<t>Example of an OpenPGP key available from a web server:</t> | <t>Example of an OpenPGP key available from a web server:</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Encryption: https://example.com/pgp-key.txt | Encryption: https://example.com/pgp-key.txt | |||
]]></artwork> | ]]></artwork> | |||
<t>Example of an OpenPGP key available from an OPENPGPKEY DNS record:< /t> | <t>Example of an OpenPGP key available from an OPENPGPKEY DNS record:< /t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Encryption: dns:5d2d37ab76d47d36._openpgpkey.example.com?type=OPENPGPKEY | Encryption: dns:5d2d37ab76d47d36._openpgpkey.example.com?type=OPENPGPKEY | |||
]]></artwork> | ]]></artwork> | |||
<t>Example of an OpenPGP key being referenced by its fingerprint:</t> | <t>Example of an OpenPGP key being referenced by its fingerprint:</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Encryption: openpgp4fpr:5f2de5521c63a801ab59ccb603d49de44b29100f | Encryption: openpgp4fpr:5f2de5521c63a801ab59ccb603d49de44b29100f | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="expires" numbered="true" toc="default"> | <section anchor="expires" numbered="true" toc="default"> | |||
<name>Expires</name> | <name>Expires</name> | |||
<t>This field indicates the date and time after which the data contain ed in the "security.txt" | <t>The "Expires" field indicates the date and time after which the dat a contained in the "security.txt" | |||
file is considered stale and should not be used (as per <xref target="stale" for mat="default"/>). The value of this field is formatted | file is considered stale and should not be used (as per <xref target="stale" for mat="default"/>). The value of this field is formatted | |||
according to the Internet profile of <xref target="ISO.8601" format="default"/> as defined in <xref target="RFC3339" format="default"/>. It is RECOMMENDED that the value | according to the Internet profiles of <xref target="ISO.8601-1" format="default" /> and <xref target="ISO.8601-2" format="default"/> as defined in <xref target=" RFC3339" format="default"/>. It is <bcp14>RECOMMENDED</bcp14> that the value | |||
of this field be less than a year into the future to avoid staleness.</t> | of this field be less than a year into the future to avoid staleness.</t> | |||
<t>This field MUST always be present and MUST NOT appear more than onc e.</t> | <t>This field <bcp14>MUST</bcp14> always be present and <bcp14>MUST NO T</bcp14> appear more than once.</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Expires: 2021-12-31T18:37:07z | Expires: 2021-12-31T18:37:07z | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="hiring" numbered="true" toc="default"> | <section anchor="hiring" numbered="true" toc="default"> | |||
<name>Hiring</name> | <name>Hiring</name> | |||
<t>The "Hiring" field is used for linking to the vendor's security-rel ated job positions. | <t>The "Hiring" field is used for linking to the vendor's security-rel ated job positions. | |||
If this field indicates a web URI, then it MUST begin with "https://" | If this field indicates a web URI, then it <bcp14>MUST</bcp14> begin with "https | |||
(as per section 2.7.2 of <xref target="RFC7230" format="default"/>).</t> | ://" | |||
(as per <xref target="RFC7230" section="2.7.2" sectionFormat="of"/>).</t> | ||||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Hiring: https://example.com/jobs.html | Hiring: https://example.com/jobs.html | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="policy" numbered="true" toc="default"> | <section anchor="policy" numbered="true" toc="default"> | |||
<name>Policy</name> | <name>Policy</name> | |||
<t>This field indicates a link to where the vulnerability disclosure p olicy is located. | <t>The "Policy" field indicates a link to where the vulnerability disc losure policy is located. | |||
This can help security researchers understand | This can help security researchers understand | |||
the organization's vulnerability reporting practices. | the organization's vulnerability reporting practices. | |||
If this field indicates a web URI, then it MUST begin with "https://" | If this field indicates a web URI, then it <bcp14>MUST</bcp14> begin with "https | |||
(as per section 2.7.2 of <xref target="RFC7230" format="default"/>).</t> | ://" | |||
(as per <xref target="RFC7230" section="2.7.2" sectionFormat="of"/>).</t> | ||||
<t>Example:</t> | <t>Example:</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Policy: https://example.com/disclosure-policy.html | Policy: https://example.com/disclosure-policy.html | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="preflang" numbered="true" toc="default"> | <section anchor="preflang" numbered="true" toc="default"> | |||
<name>Preferred-Languages</name> | <name>Preferred-Languages</name> | |||
<t>This field can be used to indicate a set of natural languages that | <t>The "Preferred-Languages" field can be used to indicate a set of na | |||
are preferred when submitting security reports. This set MAY list multiple | tural languages that | |||
values, separated by commas. If this field is included then at least | are preferred when submitting security reports. This set <bcp14>MAY</bcp14> list | |||
one value MUST be listed. The values within this set are language tags | multiple | |||
values, separated by commas. If this field is included, then at least | ||||
one value <bcp14>MUST</bcp14> be listed. The values within this set are language | ||||
tags | ||||
(as defined in <xref target="RFC5646" format="default"/>). If this field is abse nt, security researchers | (as defined in <xref target="RFC5646" format="default"/>). If this field is abse nt, security researchers | |||
may assume that English is the language to be used (as per section 4.5 | may assume that English is the language to be used (as per <xref target="RFC2277 | |||
of <xref target="RFC2277" format="default"/>).</t> | " section="4.5" sectionFormat="of"/>).</t> | |||
<t>The order in which they appear is not an indication of priority; | <t>The order in which they appear is not an indication of priority; | |||
the listed languages are intended to have equal priority.</t> | the listed languages are intended to have equal priority.</t> | |||
<t>This field MUST NOT appear more than once.</t> | <t>This field <bcp14>MUST NOT</bcp14> appear more than once.</t> | |||
<t>Example (English, Spanish and French):</t> | <t>Example (English, Spanish and French):</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
Preferred-Languages: en, es, fr | Preferred-Languages: en, es, fr | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="example-of-an-unsigned-securitytxt-file" numbered="true" toc="default"> | <section anchor="example-of-an-unsigned-securitytxt-file" numbered="true" toc="default"> | |||
<name>Example of an unsigned "security.txt" file</name> | <name>Example of an Unsigned "security.txt" File</name> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
# Our security address | # Our security address | |||
Contact: mailto:security@example.com | Contact: mailto:security@example.com | |||
# Our OpenPGP key | # Our OpenPGP key | |||
Encryption: https://example.com/pgp-key.txt | Encryption: https://example.com/pgp-key.txt | |||
# Our security policy | # Our security policy | |||
Policy: https://example.com/security-policy.html | Policy: https://example.com/security-policy.html | |||
# Our security acknowledgments page | # Our security acknowledgments page | |||
Acknowledgments: https://example.com/hall-of-fame.html | Acknowledgments: https://example.com/hall-of-fame.html | |||
Expires: 2021-12-31T18:37:07z | Expires: 2021-12-31T18:37:07z | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
<section anchor="example-of-a-signed-securitytxt-file" numbered="true" toc ="default"> | <section anchor="example-of-a-signed-securitytxt-file" numbered="true" toc ="default"> | |||
<name>Example of a signed "security.txt" file</name> | <name>Example of a Signed "security.txt" File</name> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
-----BEGIN PGP SIGNED MESSAGE----- | -----BEGIN PGP SIGNED MESSAGE----- | |||
Hash: SHA256 | Hash: SHA256 | |||
# Canonical URI | # Canonical URI | |||
Canonical: https://example.com/.well-known/security.txt | Canonical: https://example.com/.well-known/security.txt | |||
# Our security address | # Our security address | |||
Contact: mailto:security@example.com | Contact: mailto:security@example.com | |||
skipping to change at line 354 ¶ | skipping to change at line 345 ¶ | |||
Expires: 2021-12-31T18:37:07z | Expires: 2021-12-31T18:37:07z | |||
-----BEGIN PGP SIGNATURE----- | -----BEGIN PGP SIGNATURE----- | |||
Version: GnuPG v2.2 | Version: GnuPG v2.2 | |||
[signature] | [signature] | |||
-----END PGP SIGNATURE----- | -----END PGP SIGNATURE----- | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="location" numbered="true" toc="default"> | <section anchor="location" numbered="true" toc="default"> | |||
<name>Location of the security.txt file</name> | <name>Location of the security.txt File</name> | |||
<t>For web-based services, organizations MUST place the "security.txt" fil | <t>For web-based services, organizations <bcp14>MUST</bcp14> place the "se | |||
e under the "/.well-known/" path; e.g. https://example.com/.well-known/security. | curity.txt" file under the "/.well-known/" path, e.g., https://example.com/.well | |||
txt | -known/security.txt | |||
as per <xref target="RFC8615" format="default"/> of a domain name or IP address. | as per <xref target="RFC8615" format="default"/> of a domain name or IP address. | |||
For legacy compatibility, a security.txt file might be placed at the top-level | For legacy compatibility, a "security.txt" file might be placed at the top-leve | |||
path | l path | |||
or redirect (as per section 6.4 of <xref target="RFC7231" format="default"/>) to | or redirect (as per <xref target="RFC7231" section="6.4" sectionFormat="of"/>) t | |||
the "security.txt" file under the "/.well-known/" path. If a "security.txt" fil | o the "security.txt" file under the "/.well-known/" path. If a "security.txt" fi | |||
e | le | |||
is present in both locations, the one in the "/.well-known/" path MUST be used.< | is present in both locations, the one in the "/.well-known/" path <bcp14>MUST</b | |||
/t> | cp14> be used.</t> | |||
<t>The file MUST be accessed via HTTP 1.0 or a higher version | <t>The file <bcp14>MUST</bcp14> be accessed via HTTP 1.0 or a higher versi | |||
and the file access MUST use "https" scheme (as per section 2.7.2 of <xref targe | on, | |||
t="RFC7230" format="default"/>). | and the file access <bcp14>MUST</bcp14> use the "https" scheme (as per <xref tar | |||
It MUST have a Content-Type of "text/plain" | get="RFC7230" section="2.7.2" sectionFormat="of"/>). | |||
with the default charset parameter set to "utf-8" (as per section 4.1.3 of <xref | It <bcp14>MUST</bcp14> have a Content-Type of "text/plain" | |||
target="RFC2046" format="default"/>).</t> | with the default charset parameter set to "utf-8" (as per <xref target="RFC2046" | |||
<t>Retrieval of "security.txt" files and resources indicated within such f | section="4.1.3" sectionFormat="of"/>).</t> | |||
iles may result in a redirect (as per | <t>Retrieval of "security.txt" files and resources indicated within such f | |||
section 6.4 of <xref target="RFC7231" format="default"/>). Researchers should pe | iles may result in a redirect (as per <xref target="RFC7231" section="6.4" secti | |||
rform additional analysis (as per <xref target="redirects" format="default"/>) t | onFormat="of"/>). Researchers should perform additional analysis (as per <xref t | |||
o make sure these redirects | arget="redirects" format="default"/>) to make sure these redirects | |||
are not malicious or pointing to resources controlled by an attacker.</t> | are not malicious or pointing to resources controlled by an attacker.</t> | |||
<section anchor="scope-of-the-file" numbered="true" toc="default"> | <section anchor="scope-of-the-file" numbered="true" toc="default"> | |||
<name>Scope of the File</name> | <name>Scope of the File</name> | |||
<t>A "security.txt" file MUST only apply to the domain | <t>A "security.txt" file <bcp14>MUST</bcp14> only apply to the domain | |||
or IP address in the URI used to retrieve it, not to any of its subdomains or pa rent domains. | or IP address in the URI used to retrieve it, not to any of its subdomains or pa rent domains. | |||
A "security.txt" file MAY also apply to products and services provided by the or | A "security.txt" file <bcp14>MAY</bcp14> also apply to products and services pro | |||
ganization publishing the file.</t> | vided by the organization publishing the file.</t> | |||
<t>As per <xref target="motivation" format="default"/>, this specificati | <t>As per <xref target="motivation" format="default"/>, this specificati | |||
on is intended for vulnerability response. | on is intended for a vulnerability response. | |||
If implementors want to use this for incident response, they should be aware of | If implementors want to use this for an incident response, they should be aware | |||
additional security considerations discussed in <xref target="compromise" format | of additional security considerations discussed in <xref target="compromise" for | |||
="default"/>.</t> | mat="default"/>.</t> | |||
<t>Organizations SHOULD use the policy directive (as per <xref target="p | <t>Organizations <bcp14>SHOULD</bcp14> use the policy directive (as per | |||
olicy" format="default"/>) | <xref target="policy" format="default"/>) | |||
to provide additional details regarding scope and details of their vulnerability | to provide additional details regarding the scope and details of their vulnerabi | |||
disclosure process.</t> | lity disclosure process.</t> | |||
<t>Some examples appear below:</t> | <t>Some examples appear below:</t> | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <artwork name="" type="" align="left" alt=""><![CDATA[ | |||
# The following only applies to example.com. | # The following only applies to example.com. | |||
https://example.com/.well-known/security.txt | https://example.com/.well-known/security.txt | |||
# This only applies to subdomain.example.com. | # This only applies to subdomain.example.com. | |||
https://subdomain.example.com/.well-known/security.txt | https://subdomain.example.com/.well-known/security.txt | |||
# This security.txt file applies to IPv4 address of 192.0.2.0. | # This security.txt file applies to IPv4 address of 192.0.2.0. | |||
https://192.0.2.0/.well-known/security.txt | https://192.0.2.0/.well-known/security.txt | |||
# This security.txt file applies to IPv6 address of 2001:db8:8:4::2. | # This security.txt file applies to IPv6 address of 2001:db8:8:4::2. | |||
https://[2001:db8:8:4::2]/.well-known/security.txt | https://[2001:db8:8:4::2]/.well-known/security.txt | |||
]]></artwork> | ]]></artwork> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="abnf" numbered="true" toc="default"> | <section anchor="abnf" numbered="true" toc="default"> | |||
<name>File Format Description and ABNF Grammar</name> | <name>File Format Description and ABNF Grammar</name> | |||
<t>The file format of the "security.txt" file MUST be plain text (MIME typ | <t>The file format of the "security.txt" file <bcp14>MUST</bcp14> be plain | |||
e "text/plain") as defined | text (MIME type "text/plain") as defined | |||
in section 4.1.3 of <xref target="RFC2046" format="default"/> and MUST be encode | in <xref target="RFC2046" section="4.1.3" sectionFormat="of"/> and <bcp14> | |||
d using UTF-8 <xref target="RFC3629" format="default"/> in Net-Unicode form <xre | MUST</bcp14> be encoded using UTF-8 <xref target="RFC3629" format="default"/> in | |||
f target="RFC5198" format="default"/>.</t> | Net-Unicode form <xref target="RFC5198" format="default"/>.</t> | |||
<t>The format of this file MUST follow the ABNF definition below (using | <t keepWithPrevious="true">The format of this file <bcp14>MUST</bcp14> fol | |||
the conventions defined in <xref target="RFC5234" format="default"/>).</t> | low the ABNF definition below (which incorporates the core ABNF rules from | |||
<artwork name="" type="" align="left" alt=""><![CDATA[ | <xref target="RFC5234" format="default"/> and uses the case-sensitive stri | |||
ng support from <xref target="RFC7405" format="default"/>).</t> | ||||
<sourcecode type="abnf"><![CDATA[ | ||||
body = signed / unsigned | body = signed / unsigned | |||
signed = sign-header unsigned sign-footer | unsigned = *line (contact-field eol) ; one or more required | |||
*line (expires-field eol) ; exactly one required | ||||
*line [lang-field eol] *line ; exactly one optional | ||||
; order of fields within the file is not important | ||||
; except that if contact-field appears more | ||||
; than once, the order of those indicates | ||||
; priority (see Section 3.5.3) | ||||
sign-header = < headers and line from section 7 of [RFC4880] > | ; signed is the production that should match the OpenPGP clearsigned | |||
; document | ||||
signed = cleartext-header | ||||
1*(hash-header) | ||||
CRLF | ||||
cleartext | ||||
signature | ||||
sign-footer = < OpenPGP signature from section 7 of [RFC4880] > | cleartext-header = %s"-----BEGIN PGP SIGNED MESSAGE-----" CRLF | |||
unsigned = *line (contact-field eol) ; one or more required | hash-header = %s"Hash: " hash-alg *("," hash-alg) CRLF | |||
*line (expires-field eol) ; exactly one required | ||||
*line [lang-field eol] *line ; exactly one optional | hash-alg = token | |||
; order of fields within the file is not important | ; imported from RFC 2045; see RFC 4880 Section | |||
; except that if contact-field appears more | ; 10.3.3 for a pointer to the registry of | |||
; than once the order of those indicates | ; valid values | |||
; priority (see Section 3.5.3) | ||||
;cleartext = 1*( UTF8-octets [CR] LF) | ||||
; dash-escaped per RFC 4880 Section 7.1 | ||||
cleartext = *((line-dash / line-from / line-nodash) [CR] LF) | ||||
line-dash = ("- ") "-" *UTF8-char-not-cr | ||||
; MUST include initial "- " | ||||
line-from = ["- "] "From " *UTF8-char-not-cr | ||||
; SHOULD include initial "- " | ||||
line-nodash = ["- "] *UTF8-char-not-cr | ||||
; MAY include initial "- " | ||||
UTF8-char-not-dash = UTF8-1-not-dash / UTF8-2 / UTF8-3 / UTF8-4 | ||||
UTF8-1-not-dash = %x00-2C / %x2E-7F | ||||
UTF8-char-not-cr = UTF8-1-not-cr / UTF8-2 / UTF8-3 / UTF8-4 | ||||
UTF8-1-not-cr = %x00-0C / %x0E-7F | ||||
; UTF8 rules from RFC 3629 | ||||
UTF8-octets = *( UTF8-char ) | ||||
UTF8-char = UTF8-1 / UTF8-2 / UTF8-3 / UTF8-4 | ||||
UTF8-1 = %x00-7F | ||||
UTF8-2 = %xC2-DF UTF8-tail | ||||
UTF8-3 = %xE0 %xA0-BF UTF8-tail / %xE1-EC 2( UTF8-tail ) / | ||||
%xED %x80-9F UTF8-tail / %xEE-EF 2( UTF8-tail ) | ||||
UTF8-4 = %xF0 %x90-BF 2( UTF8-tail ) / | ||||
%xF1-F3 3( UTF8-tail ) / | ||||
%xF4 %x80-8F 2( UTF8-tail ) | ||||
UTF8-tail = %x80-BF | ||||
signature = armor-header | ||||
armor-keys | ||||
CRLF | ||||
signature-data | ||||
armor-tail | ||||
armor-header = %s"-----BEGIN PGP SIGNATURE-----" CRLF | ||||
armor-keys = *(token ": " *( VCHAR / WSP ) CRLF) | ||||
; Armor Header Keys from RFC 4880 | ||||
armor-tail = %s"-----END PGP SIGNATURE-----" CRLF | ||||
signature-data = 1*(1*(ALPHA / DIGIT / "=" / "+" / "/") CRLF) | ||||
; base64; see RFC 4648 | ||||
; includes RFC 4880 checksum | ||||
line = [ (field / comment) ] eol | line = [ (field / comment) ] eol | |||
eol = *WSP [CR] LF | eol = *WSP [CR] LF | |||
field = ; optional fields | field = ; optional fields | |||
ack-field / | ack-field / | |||
can-field / | can-field / | |||
contact-field / ; optional repeated instances | contact-field / ; optional repeated instances | |||
encryption-field / | encryption-field / | |||
skipping to change at line 447 ¶ | skipping to change at line 497 ¶ | |||
expires-field = "Expires" fs SP date-time | expires-field = "Expires" fs SP date-time | |||
encryption-field = "Encryption" fs SP uri | encryption-field = "Encryption" fs SP uri | |||
hiring-field = "Hiring" fs SP uri | hiring-field = "Hiring" fs SP uri | |||
lang-field = "Preferred-Languages" fs SP lang-values | lang-field = "Preferred-Languages" fs SP lang-values | |||
policy-field = "Policy" fs SP uri | policy-field = "Policy" fs SP uri | |||
date-time = < imported from section 5.6 of [RFC3339] > | date-time = < imported from Section 5.6 of [RFC3339] > | |||
lang-tag = < Language-Tag from section 2.1 of [RFC5646] > | lang-tag = < Language-Tag from Section 2.1 of [RFC5646] > | |||
lang-values = lang-tag *(*WSP "," *WSP lang-tag) | lang-values = lang-tag *(*WSP "," *WSP lang-tag) | |||
uri = < URI as per section 3 of [RFC3986] > | uri = < URI as per Section 3 of [RFC3986] > | |||
ext-field = field-name fs SP unstructured | ext-field = field-name fs SP unstructured | |||
field-name = < imported from section 3.6.8 of [RFC5322] > | field-name = < imported from Section 3.6.8 of [RFC5322] > | |||
unstructured = < imported from section 3.2.5 of [RFC5322] > | unstructured = < imported from Section 3.2.5 of [RFC5322] > | |||
]]></artwork> | ||||
<t>"ext-field" refers to extension fields, which are discussed in <xref ta | token = < imported from Section 5.1 of [RFC2045] > | |||
rget="extensibility" format="default"/></t> | ||||
ALPHA = %x41-5A / %x61-7A ; A-Z / a-z | ||||
BIT = "0" / "1" | ||||
CHAR = %x01-7F | ||||
; any 7-bit US-ASCII character, | ||||
; excluding NUL | ||||
CR = %x0D | ||||
; carriage return | ||||
CRLF = CR LF | ||||
; Internet standard newline | ||||
CTL = %x00-1F / %x7F | ||||
; controls | ||||
DIGIT = %x30-39 | ||||
; 0-9 | ||||
DQUOTE = %x22 | ||||
; " (Double Quote) | ||||
HEXDIG = DIGIT / "A" / "B" / "C" / "D" / "E" / "F" | ||||
HTAB = %x09 | ||||
; horizontal tab | ||||
LF = %x0A | ||||
; linefeed | ||||
LWSP = *(WSP / CRLF WSP) | ||||
; Use of this linear-white-space rule | ||||
; permits lines containing only white | ||||
; space that are no longer legal in | ||||
; mail headers and have caused | ||||
; interoperability problems in other | ||||
; contexts. | ||||
; Do not use when defining mail | ||||
; headers and use with caution in | ||||
; other contexts. | ||||
OCTET = %x00-FF | ||||
; 8 bits of data | ||||
SP = %x20 | ||||
VCHAR = %x21-7E | ||||
; visible (printing) characters | ||||
WSP = SP / HTAB | ||||
; white space | ||||
]]></sourcecode> | ||||
<t>"ext-field" refers to extension fields, which are discussed in <xref ta | ||||
rget="extensibility" format="default"/>.</t> | ||||
</section> | </section> | |||
<section anchor="security-considerations" numbered="true" toc="default"> | <section anchor="security-considerations" numbered="true" toc="default"> | |||
<name>Security Considerations</name> | <name>Security Considerations</name> | |||
<t>Because of the use of URIs and well-known resources, security considera tions of | <t>Because of the use of URIs and well-known resources, security considera tions of | |||
<xref target="RFC3986" format="default"/> and <xref target="RFC8615" format="def ault"/> apply here, in addition to the | <xref target="RFC3986" format="default"/> and <xref target="RFC8615" format="def ault"/> apply here, in addition to the | |||
considerations outlined below.</t> | considerations outlined below.</t> | |||
<section anchor="compromise" numbered="true" toc="default"> | <section anchor="compromise" numbered="true" toc="default"> | |||
<name>Compromised Files and Incident Response</name> | <name>Compromised Files and Incident Response</name> | |||
<t>An attacker that has compromised a website is able to compromise | <t>An attacker that has compromised a website is able to compromise | |||
the "security.txt" file as well or setup a redirect to their own site. | the "security.txt" file as well or set up a redirect to their own site. | |||
This can result in security reports not being received by the organization | This can result in security reports not being received by the organization | |||
or sent to the attacker.</t> | or being sent to the attacker.</t> | |||
<t>To protect against this, organizations should use the "Canonical" fie ld to indicate the locations | <t>To protect against this, organizations should use the "Canonical" fie ld to indicate the locations | |||
of the file (as per <xref target="canonical" format="default"/>), digitally sign their "security.txt" | of the file (as per <xref target="canonical" format="default"/>), digitally sign their "security.txt" | |||
files (as per <xref target="signature" format="default"/>), and regularly monito r the file and | files (as per <xref target="signature" format="default"/>), and regularly monito r the file and | |||
the referenced resources to detect tampering.</t> | the referenced resources to detect tampering.</t> | |||
<t>Security researchers should validate the "security.txt" file includin | ||||
g verifying | <t>Security researchers should validate the "security.txt" file, including verif | |||
ying | ||||
the digital signature and checking any available historical records before using the information | the digital signature and checking any available historical records before using the information | |||
contained in the file. If the "security.txt" file looks suspicious or compromise d, | contained in the file. If the "security.txt" file looks suspicious or compromise d, | |||
it should not be used.</t> | it should not be used.</t> | |||
<t>While it is not recommended, implementors may choose to use the infor mation published | <t>While it is not recommended, implementors may choose to use the infor mation published | |||
within a "security.txt" file for incident response. In such cases, extreme cauti on | within a "security.txt" file for an incident response. In such cases, extreme ca ution | |||
should be taken before trusting such information, since | should be taken before trusting such information, since | |||
it may have been compromised by an attacker. Researchers should use additional m ethods | it may have been compromised by an attacker. Researchers should use additional m ethods | |||
to verify such data including out of band verification of the PGP signature, DNS SEC-based approaches, etc.</t> | to verify such data including out-of-band verification of the Pretty Good Privac y (PGP) signature, DNSSEC-based approaches, etc.</t> | |||
</section> | </section> | |||
<section anchor="redirects" numbered="true" toc="default"> | <section anchor="redirects" numbered="true" toc="default"> | |||
<name>Redirects</name> | <name>Redirects</name> | |||
<t>When retrieving the file and any resources referenced in the file, re searchers should record | <t>When retrieving the file and any resources referenced in the file, re searchers should record | |||
any redirects since they can lead to a different domain or IP address controlled by an attacker. Further | any redirects since they can lead to a different domain or IP address controlled by an attacker. Further | |||
inspections of such redirects is recommended before using the information contai ned within the file.</t> | inspection of such redirects is recommended before using the information contain ed within the file.</t> | |||
</section> | </section> | |||
<section anchor="stale" numbered="true" toc="default"> | <section anchor="stale" numbered="true" toc="default"> | |||
<name>Incorrect or Stale Information</name> | <name>Incorrect or Stale Information</name> | |||
<t>If information and resources referenced in a "security.txt" file are incorrect | <t>If information and resources referenced in a "security.txt" file are incorrect | |||
or not kept up to date, this can result in security reports not being received | or not kept up to date, this can result in security reports not being received | |||
by the organization or sent to incorrect contacts, thus exposing possible | by the organization or sent to incorrect contacts, thus exposing possible | |||
security issues to third parties. Not having a "security.txt" file may be prefer able | security issues to third parties. Not having a "security.txt" file may be prefer able | |||
to having stale information in this file. Organizations must use | to having stale information in this file. Organizations must use | |||
the "Expires" field (see <xref target="expires" format="default"/>) to indicate to researchers when | the "Expires" field (see <xref target="expires" format="default"/>) to indicate to researchers when | |||
the data in the file is no longer valid.</t> | the data in the file is no longer valid.</t> | |||
<t>Organizations should ensure that information in this file and any ref erenced | <t>Organizations should ensure that information in this file and any ref erenced | |||
resources such as web pages, email addresses, and telephone numbers | resources such as web pages, email addresses, and telephone numbers | |||
are kept current, are accessible, controlled by the organization, | are kept current, are accessible, are controlled by the organization, | |||
and are kept secure.</t> | and are kept secure.</t> | |||
</section> | </section> | |||
<section anchor="intentionally-malformed-files-resources-and-reports" numb ered="true" toc="default"> | <section anchor="intentionally-malformed-files-resources-and-reports" numb ered="true" toc="default"> | |||
<name>Intentionally Malformed Files, Resources and Reports</name> | <name>Intentionally Malformed Files, Resources, and Reports</name> | |||
<t>It is possible for compromised or malicious sites to create files tha t are extraordinarily | <t>It is possible for compromised or malicious sites to create files tha t are extraordinarily | |||
large or otherwise malformed in an attempt to discover or exploit weaknesses | large or otherwise malformed in an attempt to discover or exploit weaknesses | |||
in parsing code. Researchers should make sure that any such code | in the parsing code. | |||
is robust against large or malformed files and fields, and may choose not to par | ||||
se | Researchers should make sure that any such code | |||
files larger than 32 KBs, having fields longer than 2,048 characters or | is robust against large or malformed files and fields, and they may choose to ha | |||
containing more than 1,000 lines. The ABNF grammar (as defined in | ve the code not parse files larger than 32 KBs, those with fields longer than 2, | |||
048 characters, or those containing more than 1,000 lines. The ABNF grammar (as | ||||
defined in | ||||
<xref target="abnf" format="default"/>) can also be used as a way to verify thes e files.</t> | <xref target="abnf" format="default"/>) can also be used as a way to verify thes e files.</t> | |||
<t>The same concerns apply to any other resources referenced within "sec urity.txt" | <t>The same concerns apply to any other resources referenced within "sec urity.txt" | |||
files, as well as any security reports received as a result of publishing | files, as well as any security reports received as a result of publishing | |||
this file. Such resources and reports may be hostile, malformed or malicious.</t > | this file. Such resources and reports may be hostile, malformed, or malicious.</ t> | |||
</section> | </section> | |||
<section anchor="no-implied-permission-for-testing" numbered="true" toc="d efault"> | <section anchor="no-implied-permission-for-testing" numbered="true" toc="d efault"> | |||
<name>No Implied Permission for Testing</name> | <name>No Implied Permission for Testing</name> | |||
<t>The presence of a "security.txt" file might be interpreted by researc hers | <t>The presence of a "security.txt" file might be interpreted by researc hers | |||
as providing permission to do security testing against the domain or IP address | as providing permission to do security testing against the domain or IP address | |||
where it is published, or products and services provided by the organization pub lishing | where it is published or against products and services provided by the organizat ion publishing | |||
the file. | the file. | |||
This might result in increased testing against an organization by researchers. O n the other hand, a decision not | This might result in increased testing against an organization by researchers. O n the other hand, a decision not | |||
to publish a "security.txt" file might be interpreted by the | to publish a "security.txt" file might be interpreted by the | |||
organization operating that website to be a way to signal to researchers | organization operating that website to be a way to signal to researchers | |||
that permission to test that particular site or project is denied. This might re sult in pushback against | that permission to test that particular site or project is denied. This might re sult in pushback against | |||
researchers reporting security issues to that organization.</t> | researchers reporting security issues to that organization.</t> | |||
<t>Therefore, researchers shouldn't assume that presence or absence of | <t>Therefore, researchers shouldn't assume that the presence or absence of | |||
a "security.txt" file grants or denies permission for security testing. | a "security.txt" file grants or denies permission for security testing. | |||
Any such permission may be indicated in the company's vulnerability disclosure p olicy | Any such permission may be indicated in the company's vulnerability disclosure p olicy | |||
(as per <xref target="policy" format="default"/>) or a new field (as per <xref t arget="extensibility" format="default"/>).</t> | (as per <xref target="policy" format="default"/>) or a new field (as per <xref t arget="extensibility" format="default"/>).</t> | |||
</section> | </section> | |||
<section anchor="multi-user-environments" numbered="true" toc="default"> | <section anchor="multi-user-environments" numbered="true" toc="default"> | |||
<name>Multi-user Environments</name> | <name>Multi-User Environments</name> | |||
<t>In multi-user / multi-tenant environments, it may possible for a user | <t>In multi-user / multi-tenant environments, it may be possible for a u | |||
to take | ser to take | |||
over the location of the "security.txt" file. Organizations should reserve | over the location of the "security.txt" file. Organizations should reserve | |||
the "security.txt" namespace at the root to ensure no third-party can create a p age with | the "security.txt" namespace at the root to ensure no third party can create a p age with | |||
the "security.txt" AND "/.well-known/security.txt" names.</t> | the "security.txt" AND "/.well-known/security.txt" names.</t> | |||
</section> | </section> | |||
<section anchor="protecting-data-in-transit" numbered="true" toc="default" > | <section anchor="protecting-data-in-transit" numbered="true" toc="default" > | |||
<name>Protecting Data in Transit</name> | <name>Protecting Data in Transit</name> | |||
<t>To protect a "security.txt" file from being tampered with in transit, | <t>To protect a "security.txt" file from being tampered with in transit, | |||
implementors MUST use | implementors <bcp14>MUST</bcp14> use | |||
HTTPS (as per section 2.7.2 of <xref target="RFC7230" format="default"/>) when s | HTTPS (as per <xref target="RFC7230" section="2.7.2" sectionFormat="of"/>) when | |||
erving the file itself and for retrieval of any web URIs | serving the file itself and for retrieval of any web URIs | |||
referenced in it (except when otherwise noted in this specification). As part of the TLS | referenced in it (except when otherwise noted in this specification). As part of the TLS | |||
handshake, researchers should validate the provided X.509 certificate | handshake, researchers should validate the provided X.509 certificate | |||
in accordance with <xref target="RFC6125" format="default"/> and the following c onsiderations:</t> | in accordance with <xref target="RFC6125" format="default"/> and the following c onsiderations:</t> | |||
<ul spacing="normal"> | <ul spacing="normal"> | |||
<li>Matching is performed only against the DNS-ID identifiers.</li> | <li>Matching is performed only against the DNS-ID identifiers.</li> | |||
<li>DNS domain names in server certificates MAY contain the wildcard | <li>DNS domain names in server certificates <bcp14>MAY</bcp14> contain | |||
character '*' as the complete left-most label within the identifier.</li> | the wildcard | |||
character '*' as the complete leftmost label within the identifier.</li> | ||||
</ul> | </ul> | |||
<t>The certificate may also be checked for revocation via the Online Cer tificate Status | <t>The certificate may also be checked for revocation via the Online Cer tificate Status | |||
Protocol (OCSP) <xref target="RFC6960" format="default"/>, certificate revocatio n lists (CRLs), or similar mechanisms.</t> | Protocol (OCSP) <xref target="RFC6960" format="default"/>, certificate revocatio n lists (CRLs), or similar mechanisms.</t> | |||
<t>In cases where the "security.txt" file cannot be served via HTTPS (su ch as localhost) or is | <t>In cases where the "security.txt" file cannot be served via HTTPS (su ch as localhost) or is | |||
being served with an invalid certificate, additional human validation is recomme nded since | being served with an invalid certificate, additional human validation is recomme nded since | |||
the contents may have been modified while in transit.</t> | the contents may have been modified while in transit.</t> | |||
<t>As an additional layer of protection, it is also recommended that | <t>As an additional layer of protection, it is also recommended that | |||
organizations digitally sign their "security.txt" file with OpenPGP (as per <xre f target="signature" format="default"/>). | organizations digitally sign their "security.txt" file with OpenPGP (as per <xre f target="signature" format="default"/>). | |||
Also, to protect security reports from being tampered with or observed while in transit, | Also, to protect security reports from being tampered with or observed while in transit, | |||
organizations should specify encryption keys (as per <xref target="encryption" f ormat="default"/>) unless | organizations should specify encryption keys (as per <xref target="encryption" f ormat="default"/>) unless | |||
HTTPS is being used for report submission.</t> | HTTPS is being used for report submission.</t> | |||
<t>However, the determination of validity of such keys is out of scope | <t>However, the determination of validity of such keys is out of scope | |||
for this specification. Security researchers need to establish other secure mean s to | for this specification. Security researchers need to establish other secure mean s to | |||
verify them.</t> | verify them.</t> | |||
</section> | </section> | |||
<section anchor="spam-and-spurious-reports" numbered="true" toc="default"> | <section anchor="spam-and-spurious-reports" numbered="true" toc="default"> | |||
<name>Spam and Spurious Reports</name> | <name>Spam and Spurious Reports</name> | |||
<t>Similar to concerns in <xref target="RFC2142" format="default"/>, den ial of service attacks via spam reports | <t>Similar to concerns in <xref target="RFC2142" format="default"/>, den ial-of-service attacks via spam reports | |||
would become easier once a "security.txt" file is published by | would become easier once a "security.txt" file is published by | |||
an organization. In addition, there is an increased likelihood of reports | an organization. In addition, there is an increased likelihood of reports | |||
being sent in an automated fashion and/or as result of automated scans without | being sent in an automated fashion and/or as a result of automated scans without | |||
human analysis. Attackers can also use this file as a way to spam unrelated | human analysis. Attackers can also use this file as a way to spam unrelated | |||
third parties by listing their resources and/or contact information.</t> | third parties by listing their resources and/or contact information.</t> | |||
<t>Organizations need to weigh the advantages of publishing this file ve rsus | <t>Organizations need to weigh the advantages of publishing this file ve rsus | |||
the possible disadvantages and increased resources required to analyze | the possible disadvantages and increased resources required to analyze | |||
security reports.</t> | security reports.</t> | |||
<t>Security researchers should review all information within the "securi ty.txt" | <t>Security researchers should review all information within the "securi ty.txt" | |||
file before submitting reports in an automated fashion or as resulting from auto mated scans.</t> | file before submitting reports in an automated fashion or reports resulting from automated scans.</t> | |||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="iana-considerations" numbered="true" toc="default"> | <section anchor="iana-considerations" numbered="true" toc="default"> | |||
<name>IANA Considerations</name> | <name>IANA Considerations</name> | |||
<t>Implementors should be aware that any resources referenced within | <t>Implementors should be aware that any resources referenced within | |||
a "security.txt" file MUST NOT point to the Well-Known URIs namespace unless | a "security.txt" file <bcp14>MUST NOT</bcp14> point to the Well-Known URIs names pace unless | |||
they are registered with IANA (as per <xref target="RFC8615" format="default"/>) .</t> | they are registered with IANA (as per <xref target="RFC8615" format="default"/>) .</t> | |||
<section anchor="well-known-uris-registry" numbered="true" toc="default"> | <section anchor="well-known-uris-registry" numbered="true" toc="default"> | |||
<name>Well-Known URIs registry</name> | <name>Well-Known URIs Registry</name> | |||
<t>The "Well-Known URIs" registry should be updated with the following a | <t>IANA has updated the "Well-Known URIs" registry with the following ad | |||
dditional | ditional | |||
values (using the template from <xref target="RFC8615" format="default"/>):</t> | values (using the template from <xref target="RFC8615" format="default"/> | |||
<t>URI suffix: security.txt</t> | ):</t> | |||
<t>Change controller: IETF</t> | <dl spacing="compact"> | |||
<t>Specification document(s): this document</t> | <dt>URI suffix:</dt><dd>security.txt</dd> | |||
<t>Status: permanent</t> | <dt>Change controller:</dt><dd>IETF</dd> | |||
<dt>Specification document(s):</dt><dd>RFC 9116</dd> | ||||
<dt>Status:</dt><dd>permanent</dd> | ||||
</dl> | ||||
</section> | </section> | |||
<section anchor="registry" numbered="true" toc="default"> | <section anchor="registry" numbered="true" toc="default"> | |||
<name>Registry for security.txt Fields</name> | <name>Registry for security.txt Fields</name> | |||
<t>IANA is requested to create the "security.txt Fields" registry in | <t>IANA has created the "security.txt Fields" registry in | |||
accordance with <xref target="RFC8126" format="default"/>. This registry will co | accordance with <xref target="RFC8126" format="default"/>. This registry contain | |||
ntain fields for | s fields for | |||
use in "security.txt" files, defined by this specification.</t> | use in "security.txt" files, defined by this specification.</t> | |||
<t>New registrations or updates MUST be published in accordance with the | <t>New registrations or updates <bcp14>MUST</bcp14> be published in acco | |||
"Expert Review" guidelines as described in sections 4.5 and 5 of | rdance with the | |||
<xref target="RFC8126" format="default"/>. Any new field thus registered is cons | "Expert Review" guidelines as described in Sections | |||
idered optional | <xref target="RFC8126" section="4.5" sectionFormat="bare"/> and <xref target="RF | |||
C8126" section="5" sectionFormat="bare"/> of <xref target="RFC8126" format="defa | ||||
ult"/>. Any new field thus registered is considered optional | ||||
by this specification unless a new version of this specification is published.</ t> | by this specification unless a new version of this specification is published.</ t> | |||
<t>Designated Experts are expected to check whether a proposed registrat | <t>Designated experts should determine whether a proposed registration o | |||
ion or update | r update | |||
makes sense in the context of industry accepted vulnerability disclosure process | provides value to organizations and researchers using this format and makes sens | |||
es | e in the context of industry-accepted vulnerability disclosure processes | |||
such as <xref target="ISO.29147.2018" format="default"/> and <xref target="CERT. | such as <xref target="ISO.29147.2018" format="default"/> and <xref target="CERT. | |||
CVD" format="default"/>, and provides value to organizations | CVD" format="default"/>.</t> | |||
and researchers using this format.</t> | ||||
<t>New registrations and updates MUST contain the following information: | <t>New registrations and updates <bcp14>MUST</bcp14> contain the followi | |||
</t> | ng information:</t> | |||
<ol spacing="normal" type="1"><li>Name of the field being registered or | ||||
updated</li> | <ol spacing="normal" type="1"> | |||
<li>Name of the field being registered or updated</li> | ||||
<li>Short description of the field</li> | <li>Short description of the field</li> | |||
<li>Whether the field can appear more than once</li> | <li>Whether the field can appear more than once</li> | |||
<li>The document in which the specification of the field is published (if available)</li> | ||||
<li> | <li> | |||
<t>New or updated status, which MUST be one of: | <t> New or updated status, which <bcp14>MUST</bcp14> be one of the f | |||
</t> | ollowing:</t> | |||
<ul spacing="normal"> | ||||
<li>current: The field is in current use</li> | <dl spacing="compact"> | |||
<li>deprecated: The field has been in use, but new usage is discou | ||||
raged</li> | <dt>current:</dt><dd>The field is in current use.</dd> | |||
<li>historic: The field is no longer in current use</li> | <dt>deprecated:</dt><dd>The field has been in use, but new usage i | |||
</ul> | s discouraged.</dd> | |||
<dt>historic:</dt><dd>The field is no longer in current use.</dd> | ||||
</dl> | ||||
</li> | </li> | |||
<li>Change controller</li> | <li>Change controller</li> | |||
<li>The document in which the specification of the field is published (i f available)</li> | ||||
</ol> | </ol> | |||
<t>An update may make a notation on an existing registration indicating | ||||
that a registered field is historical or deprecated if appropriate.</t> | ||||
<t>The initial registry contains these values:</t> | ||||
<artwork name="" type="" align="left" alt=""><![CDATA[ | ||||
Field Name: Acknowledgments | ||||
Description: link to page where security researchers are recognized | ||||
Multiple Appearances: Yes | ||||
Published in: this document | ||||
Status: current | ||||
Change controller: IETF | ||||
Field Name: Canonical | <t>Existing registrations may be marked historic or deprecated, as appro | |||
Description: canonical URI for this file | priate, by a future update to this document.</t> | |||
Multiple Appearances: Yes | ||||
Published in: this document | ||||
Status: current | ||||
Change controller: IETF | ||||
Field Name: Contact | <t>The initial registry contains these values:</t> | |||
Description: contact information to use for reporting vulnerabilities | ||||
Multiple Appearances: Yes | ||||
Published in: this document | ||||
Status: current | ||||
Change controller: IETF | ||||
Field Name: Expires | <dl spacing="compact"> | |||
Description: date and time after which this file is considered stale | <dt>Field Name:</dt><dd>Acknowledgments</dd> | |||
Multiple Appearances: No | <dt>Description:</dt><dd>link to page where security researchers are recogniz | |||
Published in: this document | ed</dd> | |||
Status: current | <dt>Multiple Appearances:</dt><dd>yes</dd> | |||
Change controller: IETF | <dt>Status:</dt><dd>current</dd> | |||
<dt>Change controller:</dt><dd>IETF</dd> | ||||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
Field Name: Encryption | <dl spacing="compact"> | |||
Description: link to a key to be used for encrypted communication | <dt>Field Name:</dt><dd>Canonical</dd> | |||
Multiple Appearances: Yes | <dt>Description:</dt><dd>canonical URI for this file</dd> | |||
Published in: this document | <dt>Multiple Appearances:</dt><dd>yes</dd> | |||
Status: current | <dt>Status:</dt><dd>current</dd> | |||
Change controller: IETF | <dt>Change controller:</dt><dd>IETF</dd> | |||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
Field Name: Hiring | <dl spacing="compact"> | |||
Description: link to the vendor's security-related job positions | <dt>Field Name:</dt><dd>Contact</dd> | |||
Multiple Appearances: Yes | <dt>Description:</dt><dd>contact information to use for reporting vulnerabili | |||
Published in: this document | ties</dd> | |||
Status: current | <dt>Multiple Appearances:</dt><dd>yes</dd> | |||
Change controller: IETF | <dt>Status:</dt><dd>current</dd> | |||
<dt>Change controller:</dt><dd>IETF</dd> | ||||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
Field Name: Policy | <dl spacing="compact"> | |||
Description: link to security policy page | <dt>Field Name:</dt><dd>Expires</dd> | |||
Multiple Appearances: Yes | <dt>Description:</dt><dd>date and time after which this file is considered st | |||
Published in: this document | ale</dd> | |||
Status: current | <dt>Multiple Appearances:</dt><dd>no</dd> | |||
Change controller: IETF | <dt>Status:</dt><dd>current</dd> | |||
<dt>Change controller:</dt><dd>IETF</dd> | ||||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
Field Name: Preferred-Languages | <dl spacing="compact"> | |||
Description: list of preferred languages for security reports | <dt>Field Name:</dt><dd>Encryption</dd> | |||
Multiple Appearances: No | <dt>Description:</dt><dd>link to a key to be used for encrypted communication | |||
Published in: this document | </dd> | |||
Status: current | <dt>Multiple Appearances:</dt><dd>yes</dd> | |||
Change controller: IETF | <dt>Status:</dt><dd>current</dd> | |||
]]></artwork> | <dt>Change controller:</dt><dd>IETF</dd> | |||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
<dl spacing="compact"> | ||||
<dt>Field Name:</dt><dd>Hiring</dd> | ||||
<dt>Description:</dt><dd>link to the vendor's security-related job positions< | ||||
/dd> | ||||
<dt>Multiple Appearances:</dt><dd>yes</dd> | ||||
<dt>Status:</dt><dd>current</dd> | ||||
<dt>Change controller:</dt><dd>IETF</dd> | ||||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
<dl spacing="compact"> | ||||
<dt>Field Name:</dt><dd>Policy</dd> | ||||
<dt>Description:</dt><dd>link to security policy page</dd> | ||||
<dt>Multiple Appearances:</dt><dd>yes</dd> | ||||
<dt>Status:</dt><dd>current</dd> | ||||
<dt>Change controller:</dt><dd>IETF</dd> | ||||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
<dl spacing="compact"> | ||||
<dt>Field Name:</dt><dd>Preferred-Languages</dd> | ||||
<dt>Description:</dt><dd>list of preferred languages for security reports</dd | ||||
> | ||||
<dt>Multiple Appearances:</dt><dd>no</dd> | ||||
<dt>Status:</dt><dd>current</dd> | ||||
<dt>Change controller:</dt><dd>IETF</dd> | ||||
<dt>Reference:</dt><dd>RFC 9116</dd> | ||||
</dl> | ||||
</section> | </section> | |||
</section> | </section> | |||
<section anchor="contributors" numbered="true" toc="default"> | ||||
<name>Contributors</name> | ||||
<t>The authors would like to acknowledge the help provided during the | ||||
development of this document by Tom Hudson, Jobert Abma, | ||||
Gerben Janssen van Doorn, Austin Heap, Stephane Bortzmeyer, Max Smith, Eduardo V | ||||
ela, and Krzysztof Kotowicz.</t> | ||||
<t>The authors would also like to acknowledge the feedback provided by mul | ||||
tiple members of IETF's | ||||
LAST CALL, SAAG, and SECDISPATCH lists.</t> | ||||
<t>Yakov would like to also thank L.T.S. (for everything).</t> | ||||
</section> | ||||
</middle> | </middle> | |||
<back> | <back> | |||
<references> | <references> | |||
<name>References</name> | <name>References</name> | |||
<references> | <references> | |||
<name>Normative References</name> | <name>Normative References</name> | |||
<reference anchor="RFC2142" target="https://www.rfc-editor.org/info/rfc2 | ||||
142" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.21 | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2142. | |||
42.xml"> | xml"/> | |||
<front> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119. | |||
<title>Mailbox Names for Common Services, Roles and Functions</title | xml"/> | |||
> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8174. | |||
<author initials="D." surname="Crocker" fullname="D. Crocker"> | xml"/> | |||
<organization/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5322. | |||
</author> | xml"/> | |||
<date year="1997" month="May"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5234. | |||
<abstract> | xml"/> | |||
<t>This specification enumerates and describes Internet mail addre | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3986. | |||
sses (mailbox name @ host reference) to be used when contacting personnel at an | xml"/> | |||
organization. [STANDARDS-TRACK]</t> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4880. | |||
</abstract> | xml"/> | |||
</front> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7230. | |||
<seriesInfo name="RFC" value="2142"/> | xml"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC2142"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6068. | |||
</reference> | xml"/> | |||
<reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2 | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3966. | |||
119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.21 | xml"/> | |||
19.xml"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3339. | |||
<front> | xml"/> | |||
<title>Key words for use in RFCs to Indicate Requirement Levels</tit | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5646. | |||
le> | xml"/> | |||
<author initials="S." surname="Bradner" fullname="S. Bradner"> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2277. | |||
<organization/> | xml"/> | |||
</author> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8615. | |||
<date year="1997" month="March"/> | xml"/> | |||
<abstract> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7231. | |||
<t>In many standards track documents several words are used to sig | xml"/> | |||
nify the requirements in the specification. These words are often capitalized. | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2046. | |||
This document defines these words as they should be interpreted in IETF document | xml"/> | |||
s. This document specifies an Internet Best Current Practices for the Internet | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3629. | |||
Community, and requests discussion and suggestions for improvements.</t> | xml"/> | |||
</abstract> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5198. | |||
</front> | xml"/> | |||
<seriesInfo name="BCP" value="14"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6125. | |||
<seriesInfo name="RFC" value="2119"/> | xml"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC2119"/> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6960. | |||
</reference> | xml"/> | |||
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8 | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7405. | |||
174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.81 | xml"/> | |||
74.xml"> | ||||
<front> | ||||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
tle> | ||||
<author initials="B." surname="Leiba" fullname="B. Leiba"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2017" month="May"/> | ||||
<abstract> | ||||
<t>RFC 2119 specifies common key words that may be used in protoco | ||||
l specifications. This document aims to reduce the ambiguity by clarifying tha | ||||
t only UPPERCASE usage of the key words have the defined special meanings.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="8174"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
</reference> | ||||
<reference anchor="RFC5322" target="https://www.rfc-editor.org/info/rfc5 | ||||
322" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.53 | ||||
22.xml"> | ||||
<front> | ||||
<title>Internet Message Format</title> | ||||
<author initials="P." surname="Resnick" fullname="P. Resnick" role=" | ||||
editor"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2008" month="October"/> | ||||
<abstract> | ||||
<t>This document specifies the Internet Message Format (IMF), a sy | ||||
ntax for text messages that are sent between computer users, within the framewor | ||||
k of "electronic mail" messages. This specification is a revision of Request Fo | ||||
r Comments (RFC) 2822, which itself superseded Request For Comments (RFC) 822, " | ||||
Standard for the Format of ARPA Internet Text Messages", updating it to reflect | ||||
current practice and incorporating incremental changes that were specified in ot | ||||
her RFCs. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5322"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5322"/> | ||||
</reference> | ||||
<reference anchor="RFC5234" target="https://www.rfc-editor.org/info/rfc5 | ||||
234" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.52 | ||||
34.xml"> | ||||
<front> | ||||
<title>Augmented BNF for Syntax Specifications: ABNF</title> | ||||
<author initials="D." surname="Crocker" fullname="D. Crocker" role=" | ||||
editor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="P." surname="Overell" fullname="P. Overell"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2008" month="January"/> | ||||
<abstract> | ||||
<t>Internet technical specifications often need to define a formal | ||||
syntax. Over the years, a modified version of Backus-Naur Form (BNF), called A | ||||
ugmented BNF (ABNF), has been popular among many Internet specifications. The c | ||||
urrent specification documents ABNF. It balances compactness and simplicity with | ||||
reasonable representational power. The differences between standard BNF and AB | ||||
NF involve naming rules, repetition, alternatives, order-independence, and value | ||||
ranges. This specification also supplies additional rule definitions and encod | ||||
ing for a core lexical analyzer of the type common to several Internet specifica | ||||
tions. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="68"/> | ||||
<seriesInfo name="RFC" value="5234"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5234"/> | ||||
</reference> | ||||
<reference anchor="RFC3986" target="https://www.rfc-editor.org/info/rfc3 | ||||
986" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.39 | ||||
86.xml"> | ||||
<front> | ||||
<title>Uniform Resource Identifier (URI): Generic Syntax</title> | ||||
<author initials="T." surname="Berners-Lee" fullname="T. Berners-Lee | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="R." surname="Fielding" fullname="R. Fielding"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="L." surname="Masinter" fullname="L. Masinter"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2005" month="January"/> | ||||
<abstract> | ||||
<t>A Uniform Resource Identifier (URI) is a compact sequence of ch | ||||
aracters that identifies an abstract or physical resource. This specification d | ||||
efines the generic URI syntax and a process for resolving URI references that mi | ||||
ght be in relative form, along with guidelines and security considerations for t | ||||
he use of URIs on the Internet. The URI syntax defines a grammar that is a supe | ||||
rset of all valid URIs, allowing an implementation to parse the common component | ||||
s of a URI reference without knowing the scheme-specific requirements of every p | ||||
ossible identifier. This specification does not define a generative grammar for | ||||
URIs; that task is performed by the individual specifications of each URI schem | ||||
e. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="66"/> | ||||
<seriesInfo name="RFC" value="3986"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3986"/> | ||||
</reference> | ||||
<reference anchor="RFC4880" target="https://www.rfc-editor.org/info/rfc4 | ||||
880" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.48 | ||||
80.xml"> | ||||
<front> | ||||
<title>OpenPGP Message Format</title> | ||||
<author initials="J." surname="Callas" fullname="J. Callas"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="L." surname="Donnerhacke" fullname="L. Donnerhacke | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="H." surname="Finney" fullname="H. Finney"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="D." surname="Shaw" fullname="D. Shaw"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="R." surname="Thayer" fullname="R. Thayer"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2007" month="November"/> | ||||
<abstract> | ||||
<t>This document is maintained in order to publish all necessary i | ||||
nformation needed to develop interoperable applications based on the OpenPGP for | ||||
mat. It is not a step-by-step cookbook for writing an application. It describe | ||||
s only the format and methods needed to read, check, generate, and write conform | ||||
ing packets crossing any network. It does not deal with storage and implementat | ||||
ion questions. It does, however, discuss implementation issues necessary to avoi | ||||
d security flaws.</t> | ||||
<t>OpenPGP software uses a combination of strong public-key and sy | ||||
mmetric cryptography to provide security services for electronic communications | ||||
and data storage. These services include confidentiality, key management, authe | ||||
ntication, and digital signatures. This document specifies the message formats | ||||
used in OpenPGP. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4880"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4880"/> | ||||
</reference> | ||||
<reference anchor="RFC7230" target="https://www.rfc-editor.org/info/rfc7 | ||||
230" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.72 | ||||
30.xml"> | ||||
<front> | ||||
<title>Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Ro | ||||
uting</title> | ||||
<author initials="R." surname="Fielding" fullname="R. Fielding" role | ||||
="editor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="J." surname="Reschke" fullname="J. Reschke" role=" | ||||
editor"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2014" month="June"/> | ||||
<abstract> | ||||
<t>The Hypertext Transfer Protocol (HTTP) is a stateless applicati | ||||
on-level protocol for distributed, collaborative, hypertext information systems. | ||||
This document provides an overview of HTTP architecture and its associated ter | ||||
minology, defines the "http" and "https" Uniform Resource Identifier (URI) schem | ||||
es, defines the HTTP/1.1 message syntax and parsing requirements, and describes | ||||
related security concerns for implementations.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7230"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7230"/> | ||||
</reference> | ||||
<reference anchor="RFC6068" target="https://www.rfc-editor.org/info/rfc6 | ||||
068" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.60 | ||||
68.xml"> | ||||
<front> | ||||
<title>The 'mailto' URI Scheme</title> | ||||
<author initials="M." surname="Duerst" fullname="M. Duerst"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="L." surname="Masinter" fullname="L. Masinter"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="J." surname="Zawinski" fullname="J. Zawinski"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2010" month="October"/> | ||||
<abstract> | ||||
<t>This document defines the format of Uniform Resource Identifier | ||||
s (URIs) to identify resources that are reached using Internet mail. It adds bet | ||||
ter internationalization and compatibility with Internationalized Resource Ident | ||||
ifiers (IRIs; RFC 3987) to the previous syntax of 'mailto' URIs (RFC 2368). [ST | ||||
ANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6068"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6068"/> | ||||
</reference> | ||||
<reference anchor="RFC3966" target="https://www.rfc-editor.org/info/rfc3 | ||||
966" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.39 | ||||
66.xml"> | ||||
<front> | ||||
<title>The tel URI for Telephone Numbers</title> | ||||
<author initials="H." surname="Schulzrinne" fullname="H. Schulzrinne | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2004" month="December"/> | ||||
<abstract> | ||||
<t>This document specifies the URI (Uniform Resource Identifier) s | ||||
cheme "tel". The "tel" URI describes resources identified by telephone numbers. | ||||
This document obsoletes RFC 2806. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3966"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3966"/> | ||||
</reference> | ||||
<reference anchor="RFC3339" target="https://www.rfc-editor.org/info/rfc3 | ||||
339" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.33 | ||||
39.xml"> | ||||
<front> | ||||
<title>Date and Time on the Internet: Timestamps</title> | ||||
<author initials="G." surname="Klyne" fullname="G. Klyne"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="C." surname="Newman" fullname="C. Newman"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2002" month="July"/> | ||||
<abstract> | ||||
<t>This document defines a date and time format for use in Interne | ||||
t protocols that is a profile of the ISO 8601 standard for representation of dat | ||||
es and times using the Gregorian calendar.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3339"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3339"/> | ||||
</reference> | ||||
<reference anchor="RFC5646" target="https://www.rfc-editor.org/info/rfc5 | ||||
646" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.56 | ||||
46.xml"> | ||||
<front> | ||||
<title>Tags for Identifying Languages</title> | ||||
<author initials="A." surname="Phillips" fullname="A. Phillips" role | ||||
="editor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="M." surname="Davis" fullname="M. Davis" role="edit | ||||
or"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2009" month="September"/> | ||||
<abstract> | ||||
<t>This document describes the structure, content, construction, a | ||||
nd semantics of language tags for use in cases where it is desirable to indicate | ||||
the language used in an information object. It also describes how to register | ||||
values for use in language tags and the creation of user-defined extensions for | ||||
private interchange. This document specifies an Internet Best Current Practice | ||||
s for the Internet Community, and requests discussion and suggestions for improv | ||||
ements.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="47"/> | ||||
<seriesInfo name="RFC" value="5646"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5646"/> | ||||
</reference> | ||||
<reference anchor="RFC2277" target="https://www.rfc-editor.org/info/rfc2 | ||||
277" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.22 | ||||
77.xml"> | ||||
<front> | ||||
<title>IETF Policy on Character Sets and Languages</title> | ||||
<author initials="H." surname="Alvestrand" fullname="H. Alvestrand"> | ||||
<organization/> | ||||
</author> | ||||
<date year="1998" month="January"/> | ||||
<abstract> | ||||
<t>This document is the current policies being applied by the Inte | ||||
rnet Engineering Steering Group (IESG) towards the standardization efforts in th | ||||
e Internet Engineering Task Force (IETF) in order to help Internet protocols ful | ||||
fill these requirements. This document specifies an Internet Best Current Pract | ||||
ices for the Internet Community, and requests discussion and suggestions for imp | ||||
rovements.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="18"/> | ||||
<seriesInfo name="RFC" value="2277"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2277"/> | ||||
</reference> | ||||
<reference anchor="RFC8615" target="https://www.rfc-editor.org/info/rfc8 | ||||
615" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.86 | ||||
15.xml"> | ||||
<front> | ||||
<title>Well-Known Uniform Resource Identifiers (URIs)</title> | ||||
<author initials="M." surname="Nottingham" fullname="M. Nottingham"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2019" month="May"/> | ||||
<abstract> | ||||
<t>This memo defines a path prefix for "well-known locations", "/. | ||||
well-known/", in selected Uniform Resource Identifier (URI) schemes.</t> | ||||
<t>In doing so, it obsoletes RFC 5785 and updates the URI schemes | ||||
defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track UR | ||||
I schemes that support well-known URIs in their registry.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8615"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8615"/> | ||||
</reference> | ||||
<reference anchor="RFC7231" target="https://www.rfc-editor.org/info/rfc7 | ||||
231" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.72 | ||||
31.xml"> | ||||
<front> | ||||
<title>Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content | ||||
</title> | ||||
<author initials="R." surname="Fielding" fullname="R. Fielding" role | ||||
="editor"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="J." surname="Reschke" fullname="J. Reschke" role=" | ||||
editor"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2014" month="June"/> | ||||
<abstract> | ||||
<t>The Hypertext Transfer Protocol (HTTP) is a stateless \%applica | ||||
tion- level protocol for distributed, collaborative, hypertext information syste | ||||
ms. This document defines the semantics of HTTP/1.1 messages, as expressed by r | ||||
equest methods, request header fields, response status codes, and response heade | ||||
r fields, along with the payload of messages (metadata and body content) and mec | ||||
hanisms for content negotiation.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7231"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7231"/> | ||||
</reference> | ||||
<reference anchor="RFC2046" target="https://www.rfc-editor.org/info/rfc2 | ||||
046" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.20 | ||||
46.xml"> | ||||
<front> | ||||
<title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media | ||||
Types</title> | ||||
<author initials="N." surname="Freed" fullname="N. Freed"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="N." surname="Borenstein" fullname="N. Borenstein"> | ||||
<organization/> | ||||
</author> | ||||
<date year="1996" month="November"/> | ||||
<abstract> | ||||
<t>This second document defines the general structure of the MIME | ||||
media typing system and defines an initial set of media types. [STANDARDS-TRACK | ||||
]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="2046"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2046"/> | ||||
</reference> | ||||
<reference anchor="RFC3629" target="https://www.rfc-editor.org/info/rfc3 | ||||
629" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.36 | ||||
29.xml"> | ||||
<front> | ||||
<title>UTF-8, a transformation format of ISO 10646</title> | ||||
<author initials="F." surname="Yergeau" fullname="F. Yergeau"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2003" month="November"/> | ||||
<abstract> | ||||
<t>ISO/IEC 10646-1 defines a large character set called the Univer | ||||
sal Character Set (UCS) which encompasses most of the world's writing systems. | ||||
The originally proposed encodings of the UCS, however, were not compatible with | ||||
many current applications and protocols, and this has led to the development of | ||||
UTF-8, the object of this memo. UTF-8 has the characteristic of preserving the | ||||
full US-ASCII range, providing compatibility with file systems, parsers and othe | ||||
r software that rely on US-ASCII values but are transparent to other values. Th | ||||
is memo obsoletes and replaces RFC 2279.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="63"/> | ||||
<seriesInfo name="RFC" value="3629"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3629"/> | ||||
</reference> | ||||
<reference anchor="RFC5198" target="https://www.rfc-editor.org/info/rfc5 | ||||
198" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.51 | ||||
98.xml"> | ||||
<front> | ||||
<title>Unicode Format for Network Interchange</title> | ||||
<author initials="J." surname="Klensin" fullname="J. Klensin"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="M." surname="Padlipsky" fullname="M. Padlipsky"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2008" month="March"/> | ||||
<abstract> | ||||
<t>The Internet today is in need of a standardized form for the tr | ||||
ansmission of internationalized "text" information, paralleling the specificatio | ||||
ns for the use of ASCII that date from the early days of the ARPANET. This docu | ||||
ment specifies that format, using UTF-8 with normalization and specific line-end | ||||
ing sequences. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5198"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5198"/> | ||||
</reference> | ||||
<reference anchor="RFC6125" target="https://www.rfc-editor.org/info/rfc6 | ||||
125" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.61 | ||||
25.xml"> | ||||
<front> | ||||
<title>Representation and Verification of Domain-Based Application S | ||||
ervice Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Cer | ||||
tificates in the Context of Transport Layer Security (TLS)</title> | ||||
<author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre | ||||
"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="J." surname="Hodges" fullname="J. Hodges"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2011" month="March"/> | ||||
<abstract> | ||||
<t>Many application technologies enable secure communication betwe | ||||
en two entities by means of Internet Public Key Infrastructure Using X.509 (PKIX | ||||
) certificates in the context of Transport Layer Security (TLS). This document s | ||||
pecifies procedures for representing and verifying the identity of application s | ||||
ervices in such interactions. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6125"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6125"/> | ||||
</reference> | ||||
<reference anchor="RFC6960" target="https://www.rfc-editor.org/info/rfc6 | ||||
960" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.69 | ||||
60.xml"> | ||||
<front> | ||||
<title>X.509 Internet Public Key Infrastructure Online Certificate S | ||||
tatus Protocol - OCSP</title> | ||||
<author initials="S." surname="Santesson" fullname="S. Santesson"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="M." surname="Myers" fullname="M. Myers"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="R." surname="Ankney" fullname="R. Ankney"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="A." surname="Malpani" fullname="A. Malpani"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="S." surname="Galperin" fullname="S. Galperin"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="C." surname="Adams" fullname="C. Adams"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2013" month="June"/> | ||||
<abstract> | ||||
<t>This document specifies a protocol useful in determining the cu | ||||
rrent status of a digital certificate without requiring Certificate Revocation L | ||||
ists (CRLs). Additional mechanisms addressing PKIX operational requirements are | ||||
specified in separate documents. This document obsoletes RFCs 2560 and 6277. I | ||||
t also updates RFC 5912.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6960"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6960"/> | ||||
</reference> | ||||
</references> | </references> | |||
<references> | <references> | |||
<name>Informative References</name> | <name>Informative References</name> | |||
<reference anchor="ISO.8601"> | <reference anchor="ISO.8601-1"> | |||
<front> | <front> | |||
<title>ISO/IEC 8601, Date and time - Representations for information interchange - Parts 1 and 2</title> | <title>Date and time - Representations for information interchange - Part 1: Basic rules</title> | |||
<author> | <author> | |||
<organization>International Organization for Standardization (ISO) </organization> | <organization>ISO</organization> | |||
</author> | </author> | |||
<date year="2019"/> | <date month="February" year="2019"/> | |||
</front> | </front> | |||
<seriesInfo name="ISO" value="8601-1:2019"/> | ||||
</reference> | </reference> | |||
<reference anchor="ISO.29147.2018"> | ||||
<reference anchor="ISO.8601-2"> | ||||
<front> | <front> | |||
<title>ISO/IEC 29147:2018, Information technology - Security techniq ues - Vulnerability disclosure</title> | <title>Date and time - Representations for information interchange - Part 2: Extensions</title> | |||
<author> | <author> | |||
<organization>International Organization for Standardization (ISO) </organization> | <organization>ISO</organization> | |||
</author> | </author> | |||
<date year="2018"/> | <date month="February" year="2019"/> | |||
</front> | </front> | |||
<seriesInfo name="ISO" value="8601-2:2019"/> | ||||
</reference> | </reference> | |||
<reference anchor="CERT.CVD"> | ||||
<reference anchor="ISO.29147.2018"> | ||||
<front> | <front> | |||
<title>The CERT Guide to Coordinated Vulnerability Disclosure (CMU/S EI-2017-SR-022)</title> | <title>Information technology - Security techniques - Vulnerability disclosure</title> | |||
<author> | <author> | |||
<organization>Software Engineering Institute, Carnegie Mellon Univ | <organization>ISO</organization> | |||
ersity</organization> | ||||
</author> | ||||
<date year="2017"/> | ||||
</front> | ||||
</reference> | ||||
<reference anchor="RFC3013" target="https://www.rfc-editor.org/info/rfc3 | ||||
013" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.30 | ||||
13.xml"> | ||||
<front> | ||||
<title>Recommended Internet Service Provider Security Services and P | ||||
rocedures</title> | ||||
<author initials="T." surname="Killalea" fullname="T. Killalea"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2000" month="November"/> | ||||
<abstract> | ||||
<t>The purpose of this document is to express what the engineering | ||||
community as represented by the IETF expects of Internet Service Providers (ISP | ||||
s) with respect to security. This document specifies an Internet Best Current P | ||||
ractices for the Internet Community, and requests discussion and suggestions for | ||||
improvements.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="46"/> | ||||
<seriesInfo name="RFC" value="3013"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3013"/> | ||||
</reference> | ||||
<reference anchor="RFC2350" target="https://www.rfc-editor.org/info/rfc2 | ||||
350" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.23 | ||||
50.xml"> | ||||
<front> | ||||
<title>Expectations for Computer Security Incident Response</title> | ||||
<author initials="N." surname="Brownlee" fullname="N. Brownlee"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="E." surname="Guttman" fullname="E. Guttman"> | ||||
<organization/> | ||||
</author> | ||||
<date year="1998" month="June"/> | ||||
</front> | ||||
<seriesInfo name="BCP" value="21"/> | ||||
<seriesInfo name="RFC" value="2350"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2350"/> | ||||
</reference> | ||||
<reference anchor="RFC2196" target="https://www.rfc-editor.org/info/rfc2 | ||||
196" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.21 | ||||
96.xml"> | ||||
<front> | ||||
<title>Site Security Handbook</title> | ||||
<author initials="B." surname="Fraser" fullname="B. Fraser"> | ||||
<organization/> | ||||
</author> | ||||
<date year="1997" month="September"/> | ||||
<abstract> | ||||
<t>This handbook is a guide to developing computer security polici | ||||
es and procedures for sites that have systems on the Internet. The purpose of t | ||||
his handbook is to provide practical guidance to administrators trying to secure | ||||
their information and services. The subjects covered include policy content an | ||||
d formation, a broad range of technical system and network security topics, and | ||||
security incident response. This memo provides information for the Internet com | ||||
munity. It does not specify an Internet standard of any kind.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="FYI" value="8"/> | ||||
<seriesInfo name="RFC" value="2196"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC2196"/> | ||||
</reference> | ||||
<reference anchor="RFC7485" target="https://www.rfc-editor.org/info/rfc7 | ||||
485" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.74 | ||||
85.xml"> | ||||
<front> | ||||
<title>Inventory and Analysis of WHOIS Registration Objects</title> | ||||
<author initials="L." surname="Zhou" fullname="L. Zhou"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="N." surname="Kong" fullname="N. Kong"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="S." surname="Shen" fullname="S. Shen"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="S." surname="Sheng" fullname="S. Sheng"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="A." surname="Servin" fullname="A. Servin"> | ||||
<organization/> | ||||
</author> | ||||
<date year="2015" month="March"/> | ||||
<abstract> | ||||
<t>WHOIS output objects from registries, including both Regional I | ||||
nternet Registries (RIRs) and Domain Name Registries (DNRs), were collected and | ||||
analyzed. This document describes the process and results of the statistical an | ||||
alysis of existing WHOIS information. The purpose of this document is to build a | ||||
n object inventory to facilitate discussions of data objects included in Registr | ||||
ation Data Access Protocol (RDAP) responses.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7485"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7485"/> | ||||
</reference> | ||||
<reference anchor="RFC0793" target="https://www.rfc-editor.org/info/rfc7 | ||||
93" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.079 | ||||
3.xml"> | ||||
<front> | ||||
<title>Transmission Control Protocol</title> | ||||
<author initials="J." surname="Postel" fullname="J. Postel"> | ||||
<organization/> | ||||
</author> | </author> | |||
<date year="1981" month="September"/> | <date year="2018" month="October"/> | |||
</front> | </front> | |||
<seriesInfo name="STD" value="7"/> | <seriesInfo name="ISO/IEC" value="29147:2018"/> | |||
<seriesInfo name="RFC" value="793"/> | </reference> | |||
<seriesInfo name="DOI" value="10.17487/RFC0793"/> | ||||
</reference> | <reference anchor="CERT.CVD"> | |||
<reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8 | ||||
126" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.81 | ||||
26.xml"> | ||||
<front> | <front> | |||
<title>Guidelines for Writing an IANA Considerations Section in RFCs | <title>The CERT Guide to Coordinated Vulnerability Disclosure</title | |||
</title> | > | |||
<author initials="M." surname="Cotton" fullname="M. Cotton"> | <author> | |||
<organization/> | <organization>Software Engineering Institute</organization> | |||
</author> | ||||
<author initials="B." surname="Leiba" fullname="B. Leiba"> | ||||
<organization/> | ||||
</author> | ||||
<author initials="T." surname="Narten" fullname="T. Narten"> | ||||
<organization/> | ||||
</author> | </author> | |||
<date year="2017" month="June"/> | <date year="2017" month="August"/> | |||
<abstract> | ||||
<t>Many protocols make use of points of extensibility that use con | ||||
stants to identify various protocol parameters. To ensure that the values in th | ||||
ese fields do not have conflicting uses and to promote interoperability, their a | ||||
llocations are often coordinated by a central record keeper. For IETF protocols | ||||
, that role is filled by the Internet Assigned Numbers Authority (IANA).</t> | ||||
<t>To make assignments in a given registry prudently, guidance des | ||||
cribing the conditions under which new values should be assigned, as well as whe | ||||
n and how modifications to existing values can be made, is needed. This documen | ||||
t defines a framework for the documentation of these guidelines by specification | ||||
authors, in order to assure that the provided guidance for the IANA Considerati | ||||
ons is clear and addresses the various issues that are likely in the operation o | ||||
f a registry.</t> | ||||
<t>This is the third edition of this document; it obsoletes RFC 52 | ||||
26.</t> | ||||
</abstract> | ||||
</front> | </front> | |||
<seriesInfo name="BCP" value="26"/> | <refcontent>Carnegie Mellon University, CMU/SEI-2017-SR-022</refcontent> | |||
<seriesInfo name="RFC" value="8126"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8126"/> | ||||
</reference> | </reference> | |||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3013. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2350. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2196. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7485. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.8126. | ||||
xml"/> | ||||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.0793. | ||||
xml"/> | ||||
</references> | </references> | |||
</references> | </references> | |||
<section anchor="note-to-readers-1" numbered="true" toc="default"> | ||||
<name>Note to Readers</name> | <section anchor="contributors" numbered="false" toc="default"> | |||
<ul empty="true" spacing="normal"> | <name>Acknowledgments</name> | |||
<li> | <t>The authors would like to acknowledge the help provided during the | |||
<strong>Note to the RFC Editor:</strong> Please remove this section p | development of this document by <contact fullname="Tom Hudson"/>, <contact fulln | |||
rior | ame="Jobert Abma"/>, | |||
to publication.</li> | <contact fullname="Gerben Janssen van Doorn"/>, <contact fullname="Austin Heap"/ | |||
</ul> | >, <contact fullname="Stephane Bortzmeyer"/>, <contact fullname="Max Smith"/>, < | |||
<t>Development of this draft takes place on Github at https://github.com/s | contact fullname="Eduardo Vela"/>, and <contact fullname="Krzysztof Kotowicz"/>. | |||
ecuritytxt/security-txt</t> | </t> | |||
</section> | <t>The authors would also like to acknowledge the feedback provided by mul | |||
<section anchor="document-history" numbered="true" toc="default"> | tiple members of the IETF's | |||
<name>Document History</name> | LAST CALL, SAAG, and SECDISPATCH lists.</t> | |||
<ul empty="true" spacing="normal"> | <t><contact fullname="Yakov Shafranovich"/> would like to also thank L.T.S. (for | |||
<li> | everything).</t> | |||
<strong>Note to the RFC Editor:</strong> Please remove this section p | ||||
rior | ||||
to publication.</li> | ||||
</ul> | ||||
<section anchor="since-draft-foudil-securitytxt-00" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-00</name> | ||||
<ul spacing="normal"> | ||||
<li>Moved to use IETF's markdown tools for draft updates</li> | ||||
<li>Added table of contents and a fuller list of references</li> | ||||
<li>Moved file to .well-known URI and added IANA registration (#3)</li | ||||
> | ||||
<li>Added extensibility with an IANA registry for fields (#34)</li> | ||||
<li>Added text explaining relationship to RFC 2142 / security@ email a | ||||
ddress (#25)</li> | ||||
<li>Scope expanded to include internal hosts, domains, IP addresses an | ||||
d file systems</li> | ||||
<li>Support for digital signatures added (#19)</li> | ||||
</ul> | ||||
<t>The full list of changes can be viewed via the IETF document tracker: | ||||
https://tools.ietf.org/html/draft-foudil-securitytxt-01</t> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-01" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-01</name> | ||||
<ul spacing="normal"> | ||||
<li>Added appendix with pointer to Github and document history</li> | ||||
<li>Added external signature file to the well known URI registry (#59) | ||||
</li> | ||||
<li>Added policy field (#53)</li> | ||||
<li>Added diagram explaining the location of the file on public vs. in | ||||
ternal systems</li> | ||||
<li>Added recommendation that external signature files should use HTTP | ||||
S (#55)</li> | ||||
<li>Added recommendation that organizations should monitor their secur | ||||
ity.txt files (#14)</li> | ||||
</ul> | ||||
<t>The full list of changes can be viewed via the IETF document tracker: | ||||
https://tools.ietf.org/html/draft-foudil-securitytxt-02</t> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-02" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-02</name> | ||||
<ul spacing="normal"> | ||||
<li>Use "mailto" and "tel" (#62)</li> | ||||
<li>Fix typo in the "Example" section (#64)</li> | ||||
<li>Clarified that the root directory is a fallback option (#72)</li> | ||||
<li>Defined content-type for the response (#68)</li> | ||||
<li>Clarify the scope of the security.txt file (#69)</li> | ||||
<li>Cleaning up text based on the NITS tools suggestions (#82)</li> | ||||
<li>Added clarification for newline values</li> | ||||
<li>Clarified the encryption field language, added examples | ||||
of DNS-stored encryption keys (#28 and #94)</li> | ||||
<li>Added "Hiring" field</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-03" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-03</name> | ||||
<ul spacing="normal"> | ||||
<li>Added "Hiring" field to the registry section</li> | ||||
<li>Added an encryption example using a PGP fingerprint (#107)</li> | ||||
<li>Added reference to the mailing list (#111)</li> | ||||
<li>Added a section referencing related work (#113)</li> | ||||
<li>Fixes for idnits (#82)</li> | ||||
<li>Changing some references to informative instead of normative</li> | ||||
<li>Adding "Permission" field (#30)</li> | ||||
<li>Fixing remaining ABNF issues (#83)</li> | ||||
<li>Additional editorial changes and edits</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-04" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-04</name> | ||||
<ul spacing="normal"> | ||||
<li>Addressing IETF feedback (#118)</li> | ||||
<li>Case sensitivity clarification (#127)</li> | ||||
<li>Syntax fixes (#133, #135 and #136)</li> | ||||
<li>Removed permission field (#30)</li> | ||||
<li>Removed signature field and switched to inline signatures (#93 and | ||||
#128)</li> | ||||
<li>Adding canonical field (#100)</li> | ||||
<li>Text and ABNF grammar improvements plus ABNF changes for comments | ||||
(#123)</li> | ||||
<li>Changed ".security.txt" to "security.txt" to be consistent</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-05" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-05</name> | ||||
<ul spacing="normal"> | ||||
<li>Changing HTTPS to MUST (#55)</li> | ||||
<li>Adding language recommending encryption for email reports (#134)</ | ||||
li> | ||||
<li>Added language handling redirects (#143)</li> | ||||
<li>Expanded security considerations section and fixed typos (#30, #73 | ||||
, #103, #112)</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-06" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-06</name> | ||||
<ul spacing="normal"> | ||||
<li>Fixed ABNF grammar for non-chainable fields (#150)</li> | ||||
<li>Clarified ABNF grammar (#152)</li> | ||||
<li>Clarified redirect logic (#143)</li> | ||||
<li>Clarified comments (#158)</li> | ||||
<li>Updated references and template for well-known URI to RFC 8615</li | ||||
> | ||||
<li>Fixed nits from the IETF validator</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-07" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-07</name> | ||||
<ul spacing="normal"> | ||||
<li>Addressing AD feedback (#165)</li> | ||||
<li>Fix for ABNF grammar in lang-values (#164)</li> | ||||
<li>Fixing idnits warnings</li> | ||||
<li>Adding guidance for designated experts</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-08" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-08</name> | ||||
<ul spacing="normal"> | ||||
<li>Added language and example regarding URI encoding (#176)</li> | ||||
<li>Add "Expires" field (#181)</li> | ||||
<li>Changed language from "directive" to "field" (#182)</li> | ||||
<li>Addressing last call feedback (#179, #180 and #183)</li> | ||||
<li>Clarifying order of fields (#174)</li> | ||||
<li>Revert comment/field association (#158)</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-09" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-09</name> | ||||
<ul spacing="normal"> | ||||
<li>Adjust ABNF to allow blank lines between directives (#191)</li> | ||||
<li>Make "Expires" field required (#190)</li> | ||||
<li>Adding a warning about the well-known URI namespace (#188)</li> | ||||
<li>Adding scope language around products/services (#185)</li> | ||||
<li>Addressing last call feedback (#189)</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-10" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-10</name> | ||||
<ul spacing="normal"> | ||||
<li>Changes addressing IESG feedback</li> | ||||
<li>Removed language regarding file systems (#201)</li> | ||||
<li>Adding language to explain alignment with the CERT CVD guide (#202 | ||||
)</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-11" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-11</name> | ||||
<ul spacing="normal"> | ||||
<li>Changed date format from RFC 5322 to RFC 3339 / ISO 8601 (#208)</l | ||||
i> | ||||
<li>Added clarification in "canonical" field regarding the URI used to | ||||
retrieve the file</li> | ||||
<li>Added language about machine-parsability</li> | ||||
<li>Added quotes around "security.txt" for consistency</li> | ||||
</ul> | ||||
</section> | ||||
<section anchor="since-draft-foudil-securitytxt-12" numbered="true" toc="d | ||||
efault"> | ||||
<name>Since draft-foudil-securitytxt-12</name> | ||||
<ul spacing="normal"> | ||||
<li>TBD</li> | ||||
</ul> | ||||
<t>Full list of changes can be viewed via the IETF document tracker: | ||||
https://tools.ietf.org/html/draft-foudil-securitytxt</t> | ||||
</section> | ||||
</section> | </section> | |||
</back> | </back> | |||
<!-- ##markdown-source: | ||||
H4sIAKgq62AAA+19aXPbVrLod/yK86iaiuRLUiS1K3PnRpZkWxNb1ohy8lK5 | ||||
qVcgcUhiDAIcLJIVl99vf72dBSAoK5m6M/nwVBVHwnKW7j69d6PX6wVlXCb6 | ||||
VJ2pV3Gi1assX4alKjN1FkcqTtVYT6s8Lh/VD1WS6jycxAn+dREX0yQrqlwH | ||||
4WSS6/tTVciT/fJTGUTZNA2XMG6Uh7OyN8uqKE565hF4ojfcC+JVfqrKvCrK | ||||
0WBwMhgF07A8hUlnWbCKTwOliiwvcz0rTtU3j7r4Bq+UeTwtvb8fl/UHymxq | ||||
/gircpHlp0EPhoQnLvuwO1wGPMVru4weYIf2ol6GcXKqpllahtPyOx1l9zqf | ||||
JdlDf5otzSg/9dV4Ec7yMM3u4+nCjvVT+DG7b97K8nmYxr+GZZylp+o6ni/K | ||||
h7CcLtT540TnBhpu6kcc5D9iXc6+S+3DU/9ZWkqAIEI8xfcawaTU1fh9//hw | ||||
MOS/AAqMVLi8e3V5rvBWV12EpVZhGsHdpVY9datXuS407BbXVygYU9mRsxR+ | ||||
L3U+XYTpHJ++CfOyUEMaYCTTGAgr+wM7hmnxxZQGCRP13gMCzTEuYYwwj8y1 | ||||
bVjmjowRwRpP1WgwPLH7Gp0M94/6cOl4w+7ogVN8oAtTu/WXerpIsySbP8Ly | ||||
LR3T1fgflS7gap2oI0fU/+P7O6YL55e3d/3zHy4aO7tbaLqlXldxpPE0nmcZ | ||||
DAhz6mjjSVTb5+8+7I4vr3ow/lFvfNsbjEY7T29lnM2AyuDdy3Qep1rncTqH | ||||
/RWwkKrUXXUe5qmex1q900kCe/mQAs3lBVNtbUNHQRD0ej0VTuCMwvkJflzo | ||||
1DIFde8tOgbY45wIbzxjsKfJY4C0GAK9wfBdtcqzlc5VrlfAAnBNSIepTvhF | ||||
WDSMnYTTj3Crr87gKjxaVEnZDZoTLcNHNdEq0bNSVSkPqKM+wDguFLCpagkn | ||||
QEV6BtvHcZbhdAG/9lZhXoQTYIlMUMF2x2dwnR3EykInq9ohhxF1Mc1jmLBc | ||||
6DivbdsnMNggwCie6iKAcZbhR63iUumwiGHXSEQeNHAmXncTin0G+TKOokQH | ||||
wRZSZp5F1RTXAn9vqXcZMAlaWlfd5DEM/GOWf6RDPJ4CiNXnraV95EsQvAvT | ||||
R4c0fxE6nWYVEr4C7Fey2we4RVt9JLxUKUIscOvdiH54pA63iZ6GVUFjwUAw | ||||
WJBmbeiHF4VB46Mqe4BhgR4AcYAwAGiVhDmSUlblU+Z2MI7P1cJ7YLWE2HCS | ||||
VTzKM7AEUxQVcG6aEOAONIcEChukUfdxDZ8//9ftq/PRcH/05UtXdgJEFqZK | ||||
f4oL3keW3gO9IXrgharAa7iC//7z+PL8w+3V3U/fRRkIg/S//8JCQYVRBNth | ||||
7gzMf1ml8VRglus5spl0Hlg4x0UBnA2pG6S4mwzP0z2wkkJlaQK4UjhxAueb | ||||
5uhNwkJHgcAYd1KbiDbKq+oSRKMMBkqz0owahOoBThmukB9jKBGyVtUkiYtF | ||||
HQUG8HHuKMRjvhbqAOc7Qw8qTAqHe7c1wEMuZy6iJTB31iWw/BzksAa6p1XC | ||||
eoAT3xQ7ID4t3kYOb3uD4R7iDcc4z5arCmndio2rdApjAKe41cUKZtXqTodL | ||||
GPJ8fHV7Vx90r+8NO9o7GHz5QnDDkeHwANUCRMMygxV5bx3QW4EhopPDL1+I | ||||
tSH0+eLR/vFBnbJ8kPgQFsQQX70F/k2CygIGr6AiBVjcvr26LXYEq4S63N3E | ||||
9QomYTtXN4HQogYGDfIkS7NlVhWggxWlXqq0Wk4IyGfj62Kn64+JKhIQ5Zvs | ||||
QQO77wLtpMjEA9gIHnng4wmdfCZfnGyRPbSzoSmcpiSboirTsvEAJ/36aead | ||||
1fgPEm0OROKYbVOSADFegVLhi42uetAiOlACxbjE7roEwUUtM1iA/gRyq4jx | ||||
GhyYYH0VxN3M0dO/79DQdDB8k1cu++o9Ug4suIRDTzjdBKqApGxVFqR+AGIK | ||||
EhbwRm3/fSClkE4WPk8SIg/nQHY8MwpkleGcgXmjYC4aFkDSdeUOzkiGhG5U | ||||
IqB+y2X9q13Vqa86lwPZgd9mNXFJW1yxQGxKoOBhAejCQ5TrhNSqCYA3IjYN | ||||
T8/ybOmPAsfmAQUn6MRgrxCuEMyALBh/GSP7fNATPNxwADqxYRZ2bTt9UuqW | ||||
GplsXCyFasjEqoEUV4SKdwqnFwUpaBIgFpl3ICKQIAAi25uAABNdzVS8XCUa | ||||
h0Me8xCmJQ5VlfDsr5rncythtb+x4C4L9WKRVUmEiwgfWPFCeRSz5uukDuIa | ||||
OazRgYCOqqLg3X3+7IBEOEU41HUpNUPT09u44o3ji7yNMH8UWV4i7YD8qiai | ||||
owakLK1AGaQn+WgTnZPomSqjDKAqCBOEBPbJY+PkOVm68YgpXy6BbnWn82XM | ||||
Bgbv6iNADKgkKlTn3YfxXafL/1fX7+n328u/fbi6vbzA38dvzt6+tb/wEwH8 | ||||
8f7DW7mPv7k3z9+/e3d5fcEvw1XVuPTu7KcOsdyg8/7m7ur99dnbzjptIQoZ | ||||
tGTbgeBEwg+d1ooYC16e36jhPiDuf5EgGp7A0eQ/jodH+/AHaH2iCZA2wX+y | ||||
ErhaAafGicMkAXN+FZcgo7o4BZDSQ6pQcgkNwAKWquN4ewfwnTP9RaQVl/IQ | ||||
gBPOSoRP4Jwd0eHzDpPXGhvBh+p8xE3nI702ofImBA4DZJjlneC5E3gz+EcP | ||||
VzhNKtS7AB6soWok8/ssuWdgf0X9zIDaiNzUdVYS8oTjBsFf1IsX5iKOAvhR | ||||
l3A2wcp78UKpmwSsCQ10vQQTi+nAaBorNATgfaOesZoHs1yAeE6yFdGK5fXo | ||||
wAEZ/REWTqcMkK5ex+Wimih01yzKclWc7u7O6RL6J3Y9N4/9vYdeIdgGAmq8 | ||||
0tN4JtMi7NotsRLEJbMGplmanXhKqD6mSE2kCOAYJaq7VsddF5vPUAkaNkSN | ||||
PTAF8aAWMIZptYp7OvezDGzmB0LO2cvrV2qeh8tlmHu8H7S9cJLOUNO788f0 | ||||
GSEZma26EB68QDaDhsQmawsw+/LRU5m7LElkLlTOogZH7qu3AlraDUt/MtkN | ||||
o+CjYRAgZwBGc0gj1SMG1roENSBeoSUd6wRO2gNQCuBgBsIaEX4fJmSynPF9 | ||||
916oOri2jrKimpedFyUhilHGL+Hxwrtoh1Qrwz2mGfostlEk6E8hHsxT1Tln | ||||
lei0syNKOSKJxy4e4dYnix98r0Pj93ghNR3/sH8ckJaPnPFgbzRCLL6i1ZC+ | ||||
S/CawhnswWZQ7UN3ndoO64bjqL+n3CijPeCvO0xuHQIMMikabIbmCAPATNHc | ||||
GdpyZXZqMPmd3MEzuXGzQW2zVQqqP2hLcDSixnZH/QO1tt07Q0cgfzxrBF6c | ||||
JGH6USV4lFGPk1XTsQgT0k5JaSgEi7QdXGHI9BBsQJp6co9IRC2qRYBGwyK8 | ||||
xxlUlSbxMka5xwYLzs+E2VeXcJRrK2VxBgwmRjUQOQ5sqK8+pAma5AXzMRiK | ||||
FI4H0HBQsXBIItiSttQN7ClgeldGMyBFZ8FaSZnNNakuuHljpPNY/UAmdVOB | ||||
TCQzQViim2yNl9EIXXtYCFm0Nbcq9AmTieNrjk31j9hsAfTITNCe6CUYMwbx | ||||
H26vCnFsAJ1PYaQeGgaoWrUQ/9DR1N7J8SERP+pWYICTuQCkkz4S1GEV8zhN | ||||
cRhiIDh9Z6ujtv/0abS3g4GASZYwVNf1m5DMKrRY6GjhWq2M0+YeuQrNNtAP | ||||
djY+v7pCq+QD2GNZRHhCeaHZcIdXA5h82Du6JNL906fjQe8V/qgcneYoLys+ | ||||
a2U4wYUOTvgYFiuUo7jywY43KGz9Uig+CP6v/SGpiUKhtg/vPgLsLYJorAHp | ||||
6FiAgcDQFsARTECcKB0TcRH4YKQwz2Ow1kCkwHlnRk/PzzQ7g8xWt89v375S | ||||
u7C/wQX+c7aDMPl7BWc3dG+4faht8/iZYPMinqMiCAQ9T0NkLurzlv39CxAd | ||||
mT2eSsuUFrbaCRN0HNN4oHviKLBapjc43e9XOr15faOmoP3kJIvcnE0911Dh | ||||
kaPB/ePjAfI18l1HzVUzS0dzrIveWnHABGvrrlsW4tUEHhamGRr2SUfOoTkO | ||||
YCKZW3AAuqDNVKQwZg/GPbi2FFQM0KWPAp1cBfiUkcbudCaobNNm4lIECbwI | ||||
pBHPHs3YaLWQiQl35hr1BhnOTuZ2i4ybVNYWfeSbwliPsehZxrNNmpaZaqLR | ||||
yKIJSdGJkHbQH0QGBEUDmWguxVnCY33e0v7fQDRvYxh6iec0MzwT1DO2y0EV | ||||
LDOQ/kVXdDVW3fCAp9ralzQi2tkYhOCoGNyYxewURldVj8JfCCkQZ1EBBo1l | ||||
fcabRkIw1zCD7ga1NeL+rCPuPg6RPq/Ors+Mi409psJCiThJErNmZZ4hJyDs | ||||
UR7jyxQywRGN3otWguF9gbHGEa4rNtVhkZnzz6j6MhFgxC/JLckXu344hkcG | ||||
akAfVugWQxiLMrLK9acVGBJxiWeyWqGBxv4ypqikW3dJiGDpkJEP2lF+T8FM | ||||
5KoPuKXHrIKBuwEGbuC4wgC1W+F0qlfipCHkg6XlDhO6SgdHJ3tWmLBSdmHl | ||||
I0iVNWFalChJu6RIyvaMLGmDJ467pc6maIckOpqzb+vzVli/8kW0Yj7vRmAX | ||||
zDc/0iEGOQ0Y4UCKjQj7wEeek+tpNgeW4hxBsQmOFayF0Sh0ttgNBsgGUhI4 | ||||
J6hntZoQREAmKLbRgAjY15UkYE3lpHGQjw3shliYBToXa1zPqQ4gZ/SsSlAn | ||||
J82rJeLiG2y8BwkbsG5Djll8HwT6Pfl4KmboJbqOSWuxNlkTzg96gioJmTzE | ||||
BQWrc6QnFIQdY8B2gnX15Mh48lE4HI32BkxTrVK6QQzOMvZU1N0F0Fcvm/Vm | ||||
oO/2F+UyqclxGdfhoUFOhOX6rD8C7QiOP4orABVvdhUaEeJhHN7epvDwYL83 | ||||
PNhRr3J8/EKncUEpAbMENo/SPM+KokfRChSZK4xemTeHvcFoR50lGFz5WwVK | ||||
mcIA+9/eAuD/zqCjJw97w1FvtL+j/potUvWymi4wVgdPAgt4aobD3gBeBc3o | ||||
LE1DdQu23zID+uuBco+cQmMcLJ3F8yqXPAUMGjT0IdAgjUiFU+nE64bzSFqg | ||||
fYFUWBva3OSs5ChE1HWe5KqoWCkBQQvkiFIDkdJpI4T+gwZKIDfGbt30/lcT | ||||
848LcrG0g6VNCwN9MY81+q+IAYdqDqybFP+g4boAIyN5FKIseeVm0WL5+Hq6 | ||||
90KAbLiBEGRi8BTuk5Vv1m8wIGfZmbhNUeUCYeu5qkmv8JzeJgoRtqhWTpI4 | ||||
HfXLjtVmUO2PdEnOX0k0YTB5Bldt6aQ6rVA8ontojVuxJVaYjbUqvextxT3j | ||||
eKKtBQYRvADrzwFpXIcVimy3IpZuqGXqVMwfsoYKX21UzgGNaCLwaTBC/WNm | ||||
T5hjdQ8PD/3nUHnbu3hq+Hw/b4i1Ay+hLjju/NtG4ZvaoLqIP0tARmAiAXEW | ||||
hklAsKK5mclgKSmtB+zR3F4tULEVPwNgcBfNegwUidDHI9sSxWSJbnweHc8j | ||||
EYjvBL2hnLulNpEMxYG+wkeCr/ORFpu9nY/YSHkNCtpqAsYM8iP3XhBMhg/2 | ||||
3dCcSCHOdfKarLlV8TRYp50z7Zzbqule6DNJLHWYCvbFayaxhVKDdUajAj2g | ||||
ubREviFBuOCBUprI60PmU3OrdEh1on28c/TD2ykv53BwePzlS8ChBF7f4aE1 | ||||
PUu746yOxBY6C+J26xk0wPxxJToV8wzH2dxNFgKkQoKWqSNUHM3pJwZtmAlp | ||||
Ycblhz7YbAoYJ0XT+GZXpHqCcA9QAGYRp5IQFQM58rbkbMPYgETjicbharvy | ||||
0q0abszmVGp9qjqXeobncONDfxq9hP/Dv+TC0lH7S4Dy0/8YYtZd7+DgAPSj | ||||
0Z672Sb8bVDErHhNE0SGdukQCNavQ9hmtuahHE1tJIOgVe1vsDl5T0f1xJ++ | ||||
+l4/Ok9l4KJ7HklSXmypw2gT0QbGjgrpYK0ykPnke0Djx7osnLqFK0eH7UQ7 | ||||
TePfoBQ96TOxrhcErIhNWHfdUaJ8R0nw+xwlno+55i0JPG9JTQMifsVh8qJa | ||||
impAkMMx4yJodfWsK0HOiGSe5alCzgAiR7NzuuEMLr1OlENED4v1uuHiqLv9 | ||||
jKzmqx4MuCbqnz813L25vIa731/+pC6ux2RF59HmZURpcXoQjaK9o3BydBjt | ||||
H0V7h/3/k8EUsBhci7e+/yofV/o/3QTPXGPTQsd4AcYWQDrMURGGs7F5fbKS | ||||
/dkqPz2YjSJ9cDAaTg/3wuPBMJwcnEynk8PBXrR/Eun9/cnoZDgYzNa5yqdV | ||||
jK5MdKjRb0/ZRFEtZZxjUGzuyN3QOMxNKkvTXAqMWup5UQogNR5W+BDS67qM | ||||
osfwOKq7zeKQlSZgXUE4nVKO9NwExG2+2yrPaBV0zk2qPMbxW+Ty3t7eCYrh | ||||
DS5py+OC+koow5gVStTHHplPykLEXYEM7z6LZf8pB/Y90PvBMU/Bs+Fk1MWF | ||||
BVM2Gc2VARXVBZ4gGJOyR0M0wfeGd8Pj072j08HRr2vk8CamlO/PWwv65Yvk | ||||
5/DljoOzTUJCx5UHZM6U+KawjK5n8qn+noGamxXscfuXM3Bvn7yXdi4Diyza | ||||
pe9NBgYb+p1X9MvXPXlOgm3ONuAxnfNA1FGKT24M81eY+1JgUQG53v3oAsC9 | ||||
mQdmDBYvWemP4B1jcLYjwUGoxxDagBGj8vXehum8CufExVARTEKhXLtJUSCM | ||||
sDN7xqCqprgfCTOQeIkdirSlMPdVS9b3q8kyLmtGoO96pbyakmKq5GY1EdWA | ||||
47xduEtBOeb1qF+FxZptVphEoYgxAZwG03fKAO0Iz/Qhf3gh9Qs2lGxdIrIW | ||||
3ITZlyrDeUG4W2N1B4f7FHBdX0w4KSi7tY0cAwyi+MrFZTrnDG8WGW7ibI2n | ||||
22z5/oFLnRiNjo6cEcJJuOTsFzHjssrYtxGmBp0S6qJ0Jljlt3Q8xFpxeEVo | ||||
1PJpMBFA/6MC5Js3W/jwU8zWiPdt2XpXjVfoVloQr36Fkn2x0yD/ddo9VZg2 | ||||
hxQyy5vR3LoCUaUc5mzNbagHit9XXuqisaWeZQLJy56y8ptUtObcfJCfPPZW | ||||
YviHfm0PLR7w3+tq/02isYYD9UwE9PDn5eXrq2uFQBxfvb4GzeHd5Xh89vqS | ||||
bgZvwmJxCgb22ejgEHd77rsK2/xiz3KG/X/U/1Oob8Hb2d2HW0HZD1jxhpB4 | ||||
nVY3r9X9qD8Kgp+tRfQLvw5aYtvLNapyaXViNPpIZMfr5y2bVBcEr0DhAhnN | ||||
BTpkRqFE7zYyDIhhcW7mpngF6RB8t0ZEHYBqufhW6f68/9sozqrplBh8ODzA | ||||
BH48Kl7NB+aJXN0YYsT6W9Af9TyckiCEmcUA7pJcbkJiiSWwXuKnqN9ltuol | ||||
mKhKS+f07whwOy3X5Mxhf7+moAzFj//7oESCstXXGsSF74+dZKA5GSwW7ONC | ||||
QW4MpJaxrXhHeSmikBPrjPNkijF+Cfu/ubu7UcP+QFGa2ALgBMu+ZyoNTKSA | ||||
XufXeBT09rA+1xH35rOdu1eiGXISHbnaMbHr7pHzITqYabMLaIrTTmCzs0Dh | ||||
CLECBBODUC1BNWipqYJQU4l5pypnveN1F/N+f+hnRY4G+5IYdsv+oJBq1Frw | ||||
wB5Yl/DvMuRERSJnPT+JagzXjLILvUlEwVNEVPe5iBULL6E16oWdYDlh8lgA | ||||
dTir1sxT+DEl4/ihhG25T7ooKjzLEDMrsNIK0O27z9xG0QjPsyRhJRNNUAqN | ||||
U6UiiLKxq97RVOePGZltB4CQzCWCLnSn5UgHtdNsqNkLSFl/HVgSXVo6mrwp | ||||
echiKv2Z8Ei8k5DSf+VKf9OKTGKpXZAU9DCuDUv0K95U00oy2QTGeyd5Uba4 | ||||
yKuA/SIJQ4Wfol7LyEYbuL32hgyttcobXDLHPuLi99faOKn4m2pt6jkZXnSU | ||||
XOhsjTK5+bnJnz+Lzftlh7MuCLT+akwJma2aMSniWPPnysvKr9VAm/KGMeaU | ||||
itgpjN5NEYL1TEg/scGSqtQUe5KrH/xWBYpMgOaIlmb7rWO33v76LOvCzpvy | ||||
6uZ+354ygOLwZNQf9PE/O6299M9PdehPNRoMhqfR5Pj0+HT/9HTkJvy5ceeX | ||||
58Vlg61aW5ELLZkeUldAVRGvpSri8xaVQniyzy+4aBfYRjqS6OHag+13V+8u | ||||
FXpna2Jpp5Fh96SscT63CZc14sHnHNMPd696x8ZXeDjC2igY7VqXPZMkTDJA | ||||
LOzhybGNYLaVj7SWiXiJ3HQE1DZNHTwRPW2UD/g4mGTRo/J//lMZa2bXWpZB | ||||
IJfWHustqN7I2aB0cZZlIMf5LfOEeevPamGKQm1GMfrja+m2P0uy7S/qLzIK | ||||
D+mNYswRF5P4yjB2id4WXtD82xJn67GBr7NkR31LKlkm5n2u/1HFGLhULT8y | ||||
iPjL64PAsZ9i0iMO9oxBfka/hBvhF7lcH8dkGbaO8624SGzZQjMjxvhJQBJl | ||||
eYm1n+3D6E+UREk+nNgGT3v1pBQEzob3rUdE5K0sqlxkXm1CseFl43lR24XG | ||||
vHVTZXLQ39sJAoKJ/wOY/Flt89J2TQ78jvoFYRgE8I9qPv7ix/GN+vn89hf1 | ||||
9lUQ8Jv1J761cBZAti4VtCgByW7r/WmYPn2/BtZdf9ZcA4y5fAO9u9MNwHJB | ||||
XTvIpp/W99mx/+QiWdw/+QhwUr4PwCwa9wCYndNOEJg6itqNrY56sY3I2FU/ | ||||
nL85u6XKAFMoAbh2APZealj5wO1Be7lRwP6DwEHce8HPrfcerQHfPGrTatyD | ||||
9aMtD4rLwDyIsbAexsHg8SZK6HF7sTZ0DfxmaBtecc95jMFtq8VtaF6i59kB | ||||
HAQ1BNqX6WJtErsHD3Z/Fk5h8vlcP4pDw2IxKEYsliYtw7mqvW/W1ruDO7Ux | ||||
pMDnZ/E2uzHEc23GsOO+2KaD2+l2+ASbG0AosIE1svszmR8N83HPLvvkmKe0 | ||||
xOu96ur6DIC82jfhGHz7q5CiWkC7z73RyIgjO97XR5DyOn8EX5Hq2C34bQ4k | ||||
jx/7TnFSn3jNTXMlzzCoV098Qc3MZmyd10yKIHgpvXhE8ZJfKQmTektYxc9Z | ||||
oN2NBgq1NHEJWMplPInTiA07DJ51yRIXK0Nsz6A5XFUmXMGPqpEtFjNdGEjd | ||||
5GWud2zBzEBrHmFlmTWTWQouwsLv6MDxMUpQppgIFyK7B4JNWikMgzBC5aLQ | ||||
ZbXyvQu8q5gaq1AzGC8E6NwRzUCTRMg5d2Cq4/t2QzegGVMzi+8FuCM7rsQl | ||||
hHM0uDkrpOlKbCTrrdcs+cE0v+aoCPzs0Q2VTY3CLYFES8JAsSEJtysOnjlm | ||||
2cIoSxi7NJ0xYk4qILR4GRbOSwJrx8RdxALYatTrDG3PJxKkgE3Fkdlqax44 | ||||
he0QLzZBKGhPqKESioWmlmXkFHHpKoAH2ATFADhFBeP/WFDkNYjym9yspVx4 | ||||
+Z7ty0yy7CP6X4qV8yR5lE45hOu5GDY5nLOa8A6uD4V8RDVwvq+DiicXGSp/ | ||||
1uNR72BjazqCp1Kd230klD5I3jusqAayBX6GBSjwZ0Uwcd4TbFWQGgBShhT5 | ||||
J/BdbzVdrK6datw4rpwcmxMNL/oMoOFLa3P6Uaq5c4xwMiK1r2CC4IkpU8bR | ||||
CrYkgOMyoW5F+FhcjwrUzJ4u5i6NL88lCADsMs9CWAMCoZwyB7w1TkPgcc7B | ||||
KGls4pXzvV9cap0+eoejnvBlHuy2nQom0oDfNxMTONmTRT2aKCMwowR7U+lv | ||||
moPV3IibXZfqVZVjfRaY6+iOM+KEIeomphY+liqfPDleslKzjIDACCIDO4JM | ||||
sYQT2zgmutZQ8vMWpyRRBn+tyUTN61yHZDuRc1BaZkO2jYfrI9pjIC6QT4Wl | ||||
Flfkb5YMQZsL1JMMdl5jnFCIApgCaMHcSAL+R12qmn3lWK7EeWRamfSxLQke | ||||
HmJqrTuV/oucVGHaA8obnAhW7znqvCPNkjJKbayM3HXaOdfSoh2Jag7ntLFv | ||||
3UmqbL1xhs1gW7OdgV1iNh5z/zUvqhwC0KYqUxK/aQfeMbMleY5OTOWAqQco | ||||
us2E8m57RjlFBohYOAG77HKDPIr1IN66jVPVpIYuBYnsKIQ1ewRK9i+RlH4X | ||||
JtRwSvSqLnJAWT2OcMs0aAq4DdmYXoWWj6KXxQYxuEkWalI5mr8SjuEaGu6R | ||||
lofc7DSPk0cwF/I5+WlcrebSroqKW5Bj6OWKaNu0FFXUPWKVZMDfH3T4MSV4 | ||||
ouMP27RwJ8ZIt3J0PyCDa0qFh+MLGOjLswmVvosWZdfnVuVCUUYtpw5wTkBK | ||||
aASXokXfoWFydqrsjdT3L+EtOSXi5hGipCdG3cH+sd+OIMuNVoBvuIyVYXcw | ||||
GEgbDvKd1xrR1NOCbDOaHeI5FHUxGTxUKoXNVZxg43AVrV48nAVaS1N0CeVp | ||||
4QI2rkS7lUcKJ27TArtWlaYCm8d17me14dD1gKWcIBvxCTx+MmbJ4ZOwGUjY | ||||
1CIDdQEPkMOmT7x8Rq4zhW0yMCn7BsvACjbB4ME7TdqGracoqDoi2xA2dhFu | ||||
vwxuUk+3Ck1sSzpqmOmQ2DMHkJJn9pR73SpvA05TZI3OamRdCsj9M4G1wElS | ||||
rrChrTm5BUIn16TANFeKXkR/zPr+QQgwe2YKApqmRiaRnsYEBjhKgddm9LfB | ||||
Ge3LupSkxpysOYSlNf84lc0eAFLNkoZQkR5UNQThVnkkrzaQO4ASuLFaFvEA | ||||
qm5sexI3IbeqisUENCIDsFpx+HqBWk1UN5pRmH6q1KygRbNLv6nXDTgKzjkn | ||||
kIg5aAcyMBUqIsx5O4UPC+p82iDVPrV2IdbqPSnnsNbbhgMfyxVwgLWE17Xs | ||||
2qAlisl5Eql+WGu80XCLSMOAd5jD2QPGl6vL9D7Os1Sa0YARsnT3duUPGAID | ||||
vdp7lCpBcC81mRgqeg9RA0JG2k60NO5oLedr1UJyLplsc0VQEypqNCOJM3nG | ||||
Ykc0l1R0OWxcVrLSLhI5dOWJbQOfXV80clhaJmZA3rDLAenzQlStOyATOAJ1 | ||||
j0S7IYgeMlZt2V4XYUEkwaM0bFCT5hJggsz4mdktkuWL/M63kOKy0MnM9u3N | ||||
/dQTFEWSOl0EdXUf0L4tkRUa12ktwKm8fp+1BIMdbvQrPc1wCXdvxwHyumIB | ||||
hNJqhNVcE5ZJ/+/+weBEgQAueXCNKg9XRmCEgeEnFYjD0YH448paUL3ucTsN | ||||
gh7ogeWU0ifiwqS5aOn+6AscMFR7VxeKTHcsWqKWRj2qvfE7AbMdw5X8bqUF | ||||
5XqY/ks43EOcRNMw95oRqW9efIOi3nCEBDg5tXbvLTPSxSY68U07txJRUbz5 | ||||
6HgaJYc8M9qg+t6cR+6xokEGUUjq3HsbzMOyKoIb6TSjtt+fj292DGxPDgeY | ||||
S+JP5w2LOcrcVwkbJVNX6GWMssEWqEu3YXJ2fKUVARxc8dkQTF2GGBwAY2Ig | ||||
g0lQtyFWGBeBFJfxC9wQCmU0EZW/6q7v3FhUS3hKCE/yYnzTmz0qpV9SXvet | ||||
LLOIa9ke2K1kzzFn49RK9gGZjxxRFC5BThvXdqk2M+XuNxrxf93VyPCj3Ztg | ||||
c7vbEUQVzNiV7CNiWWua6EZuhabLxEC6se9u0Op+lRLjRj1nsal+F3vaoWrH | ||||
SI8LWYYt2THN+LGQgaQsgNv24uZMPb+dAfaFRhxLbSPREE0fF8ZzRdk+Abei | ||||
aTKzvmr1qJq+SyD8Q9bVWKNj49NUZGeBsy6Wkry2Cpf8wYIVjIoWpDU7x3Js | ||||
uN00mx02G8L04UdthNm26LSmbwwdlAJHFxwGD+JDnFI6En+MgSLc7QLK16Cx | ||||
03pDkyWfpSHo+vcAnDaMHUKSGMxCqmA2CzHHU+r7U2q3viR9aBaCvs0+J2on | ||||
UHhWj3uqmCI4kf4AYwEfXJOMCMJGXGyFM/RcippEMJy2ixDCL2dQWVdQ8/+g | ||||
Ep3Ipw1KaUrkWVe75AdY72/QdKkY2njQoPty5CK6B5WK6jdq1py3Rsx3rbgb | ||||
mVWyQBv03uTGVgbSvvHJeRpsnAJQftVB8zx/JTAAzDwGdRLblPjOH0/0tJVB | ||||
im/Sqygy3GMTln0Mky+AKlvraKb2wNRYrBnI+3ozx40+YN7JBlXfVshQNqqJ | ||||
Nv2ICuH3FBekWKFTQIU/leY7IV4XM2KRtPh6Ay8ODoo+3hzZNEeTYsXG7Y5r | ||||
sOb2XK0imwjc0He8NjESlt523mP0LCXkpkLI19YGmhF1iqhms/hT4/tXwTl/ | ||||
N8n64fJTdXV59wqoqpZZatoebxc7p6rWrBueJA3jlKyjMKVL5Or3msfVkvte | ||||
sZ8IIwDSOw4oACEbM8nrQrrsiJq/RqUyggc/pIA15ZFAMBwd2q7F9nFQ2BKr | ||||
wYnbCpaJNedqzcWjxMVjHFBkj68JkyC4hnMmM5gYcC7odD3aav3CmktGMx/9 | ||||
xaDWAPjw4HbUHL+slHCn6aK1eUiBZWrEQw7cdznMvtF0dfYkec89oq6XO9t0 | ||||
rtYdyuEQ+1SS+G2W4Foest0otetmJQXm4N3Jdxg+rbiHF6Ia9VpUIEnWhvRd | ||||
pYy5oYOoA2iwpD7f2K5YO8s7pcRKTOJOo4oQzQ349JPf2qDcXl0ET3zwodlI | ||||
vWuaN3Ifby58bH4qKJBoi6uPLZxgIE7cSjT4Vo1qfEvDMQOPm8P5VkoN+0pd | ||||
h42WtzbiYlFuQUjZfyN4abxApSvyUl79EfCpPXjqR0GNG5pEclvlIb6yD6/c | ||||
kWvPfC7Cq5RsUEttwTVdZTueufAzfSHsAHcJMHPboI6IlU0pMQeNv9xivyPW | ||||
MyGIU2kMY8tZzQ2yx+3TEX5zjhw7/guYeEEGArxWYUI8fosDj0NVoCMi5jR3 | ||||
+biIG8zEzRtzuwDO+ioO+2qNM1MmCO+a7BUKAIRorwsc09onnGonx1SikgOU | ||||
uoB5NGFX5AX4yT1mYIB5lxTPXeXYSFFsVEr+pVwAYau2Izq73FlIMXXiD7e3 | ||||
vKbPEDYS58wjXuL1qS1Yb2k8WTtX9caTZqh3pmP0GdEo5S2eqp9c8uKNx4qb | ||||
Mk0eMZJNkGMub5SZLRu1iSmtW6z3X7N2CtVq/cH2wepx+y5avuwkuRX15mTN | ||||
dp1/rC1KpLZ1i081GPG+h9BsHvL0Dq+zf/EGrTH+5HkLuSlT/Zs+G1ov/cFQ | ||||
yPmqT+6ufH4zkD/Y5jhP9snNNWqbuRT5D7aL9VThDVviby64LheuVUItTGN8 | ||||
Ef++o8Y9HUEvr9CAZeHI3zEtGk1vXak4mzXUTMU6xaMqF3MuiNq+cGN0KdDP | ||||
78DIe1NFBTps/ppN0GI4myzDbvBa5xNQUP4K9jZoxyCDU3WRZTk8dkYZZuqN | ||||
Dldd2KJewXa0egmw+3WpH9HF9i78pMZg8S+66jKqwjzK1A9wLljb/T7/9bH4 | ||||
tYTFfJ+VoINOf+237ZScNJu2i/33KUToB2vtpx2Wmj/Mh9/wA7h+UwRvz0CZ | ||||
Oz97+xYWfHb2mhcyvjy/uBrfnN2dv2EHNayDv2rcgDWuhLsMv+3f9cd9+QwJ | ||||
fnCAut7uyGdJcUV/2A8X/dbvFl0YInlDutzj/8g20NtJaXQbv5o9GGA0Jrtn | ||||
6w41AUYpKK35xwg9IGWWJXySGQBi88BrZxG5yinlVLolko+eP7syq/DoWfZg | ||||
XUGFndB8ismL/HH6Pb5PY/vd7eXbx1t7O3bqett5E3XY2BIf3t13L5MNiik9 | ||||
kuNCkgWlySKmjDkEP7p81a5lYd81PqG6vTU6wAG5HBrGCk1PGOm+w/kBFOrI | ||||
CgziSnFy10ugsJk92KebvnyJEBpzz3uGe8t3I2gL21vDkx0pBgRoW1jzN7YL | ||||
07QIHRQ6srEnRLDjUfht5Y/YS8/QL+G7j98M74OZvIvdLnY3k8/wWUQ2tFBH | ||||
QxRMnE+MLXL3cQDbHCT6yKesbSFHw8c3QdMr4RMaovAeJvY4MrIksL11cOLw | ||||
LhJXAvdbBx49RXGImUw+VbRF07n3W2q+B3hf9B2eHQZ5SBtU8jo7b9hGLQVY | ||||
4m1bBwc7T47VGu7xstjjhk9PkuG3hvv/ZsIZPYtwRrD5D9hmYr2p7vbW4Qhh | ||||
8wqIqXxcZbYbhvTZ6Vj2CE/SuT9PwpzDhbb1HqUwcOJvlj/yF3FmYZKQ8GM/ | ||||
G7x+RBNdiF9R+FyPSoLNZzRNXjlOduwm4xSnwm+XsF4/Da+c8Cs6JKLDlF3k | ||||
TpygnfG+rq/uxsKMi2o+x5wXRPn21vHIkciUtzh1H49P9QOFmqWyqw4F7UcE | ||||
+UQY5a0rPMYU0WM5BobjC262vxZJ3BodE3K2TjweW2/79yyM72142Rxy54qX | ||||
Bs+Ws9Ta1ZquwPIhH8qA93pi4gkYHPlHS6STmQbpjRvuF/TwcOgeDi1lmdes | ||||
/MCAAH7WFd/YE+oUPTiOUuxZYfB1bj4EQ5+/ctKRpYfY5/QFE26Giy3mzEVe | ||||
Cb7ccfmCNnF5a28gM/OylsLKKFNTkrlgFYbvmfC4JlUD/USGCyA68WrxLMTt | ||||
83Ao0nA2YhZWj0R48LFAHcZ8vY6qu2oUC8+NCC1jbsI9I/DB1b29roJ/2X8O | ||||
vxziQ7ekC0W1xLAaDMwDPqOlamRMSAQJNF0YcU1nxBOw21snezLX6HjHAbzR | ||||
9p7oiKa6wwNrexCYhNgYc5bvtfSbwq930W0DYfMNdrqNe9+zpIEHoF+Pb2CH | ||||
m7Ur5nsyRWkCOl9D1IFPfSxnYBzyx3ryRr5RxK33rOShJuUey0A9nVQiE3dE | ||||
VHkMwI6AuUcJ06Ops0AhRPu9NIrTppI/c9xYT/qEOAOGTwrdAMjiiGhjQP8O | ||||
4XA9BwiHcjYb+CKOmaU9+oAet/41uuPwYFAXIvXMZ7g/qt+3JXpJNgc1wW7X | ||||
PeGj/oCo7IP4yj1+wBn7JmhI/btq2rKoqhhDtHsiTkMBRiu3JcsGP+X2DPAc | ||||
1Q/z2UXtKB8eGMGL66kTfOoXEtPD+x43Eib4EObIkgpHahg+owAbKbwuDqU5 | ||||
DvWsRR+vkx2xMBEFrrcMgs19Q3BreHQoFLteBbI1PB76Z9KOTNDt2F43fDql | ||||
oBbfMkLZgDAJQZBM6WtQHiSPTpBojwfCao49AqHe4M3WDPjKPnO2e/QlCAXt | ||||
ClsrimwaW06KJPUcuJ3QSun7e4RLssmxT4j3zU3gM+WDpo/YyY5pMScEnHcY | ||||
4GiCziZF4GMDj6uEBv3uE/RNmnaRfgSlz39ZlXL4zbOKI3yUab5rs8zxvYNn | ||||
oeD45FlQGg4sFRTGdGM5N35tx/NEjsc7Ddn5Jh4qTINhG6+lMmzuPwNHdk7p | ||||
vy7LAGOb6vyHC4430yjP43jDoUfFkfAS7B9DhIwcBMvEDTfBAn0wfK/G7xX2 | ||||
tqZ5jh1brwttjMRPm3W9btvlpqZexpZqObZEGPUPIZORbx/9R5VRx2HGfzMR | ||||
gNOEWChOH58FHrQ07l5eBMGrf4tBFPw/9sm8ITuNAAA= | ||||
</rfc> | </rfc> | |||
End of changes. 122 change blocks. | ||||
1435 lines changed or deleted | 577 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |