diff --git a/en/administration.sgml b/en/administration.sgml index 9be5be63e6..51198ccb2e 100644 --- a/en/administration.sgml +++ b/en/administration.sgml @@ -1,620 +1,618 @@ + %developers; ]> &header;

Introduction

This page lists teams, groups and individuals within the FreeBSD project with designated project roles and areas of responsibility, along with brief descriptions and contact information.


FreeBSD Core Team <core@FreeBSD.org>

The FreeBSD Core Team constitutes the project's "Board of Directors", responsible for deciding the project's overall goals and direction as well as managing specific areas of the FreeBSD project landscape. The Core Team is elected by the active developers in the project.

FreeBSD Documentation Engineering Team <doceng@FreeBSD.org>

The FreeBSD Documentation Engineering Team is responsible for defining and following up documentation goals for the committers in the Documentation project. The doceng team charter describes the duties and responsibilities of the Documentation Engineering Team in greater detail.

FreeBSD Port Management Team <portmgr@FreeBSD.org>

The primary responsibility of the FreeBSD Port Management Team is to ensure that the FreeBSD Ports Developer community provides a ports collection that is functional, stable, up-to-date and full-featured. Its secondary responsibility is to coordinate among the committers and developers who work on it. The portmgr team charter describes the duties and responsibilities of the Port Management Team in greater detail.


Primary Release Engineering Team <re@FreeBSD.org>

The Primary Release Engineering Team is responsible for setting and publishing release schedules for official project releases of FreeBSD, announcing code freezes and maintaining RELENG_* branches, among other things. The release engineering team charter describes the duties and responsibilities of the Primary Release Engineering Team in greater detail.

FreeBSD/alpha Release Engineering Team <re-alpha@FreeBSD.org>

The FreeBSD/alpha Release Engineering Team is responsible for specific release issues related to the FreeBSD/alpha platform.

FreeBSD/amd64 Release Engineering Team <re-amd64@FreeBSD.org>

The FreeBSD/amd64 Release Engineering Team is responsible for specific release issues related to the FreeBSD/amd64 platform.

FreeBSD/ia64 Release Engineering Team <re-ia64@FreeBSD.org>

The FreeBSD/ia64 Release Engineering Team is responsible for specific release issues related to the FreeBSD/ia64 platform.

FreeBSD/i386 Release Engineering Team <re-x86@FreeBSD.org>

The FreeBSD/i386 Release Engineering Team is responsible for specific release issues related to the FreeBSD/i386 platform.

FreeBSD/pc98 Release Engineering Team <re-pc98@FreeBSD.org>

The FreeBSD/pc98 Release Engineering Team is responsible for specific release issues related to the FreeBSD/pc98 platform.

FreeBSD/ppc Release Engineering Team <re-ppc@FreeBSD.org>

The FreeBSD/ppc Release Engineering Team is responsible for specific release issues related to the FreeBSD/ppc platform.

FreeBSD/sparc64 Release Engineering Team <re-sparc64@FreeBSD.org>

The FreeBSD/sparc64 Release Engineering Team is responsible for specific release issues related to the FreeBSD/sparc64 platform.


Donations Team <donations@FreeBSD.org>

The FreeBSD Donations Team is responsible for responding to donations offers, establishing donation guidelines and procedures, and coordinating donation offers with the FreeBSD developer community. A more detailed description of the duties of the Donations Team is available on the FreeBSD Donations Liaison page.

Marketing Team <marketing@FreeBSD.org>

Press contact, marketing, interviews, information.

Security Team <secteam@FreeBSD.org>

The FreeBSD Security Team (headed by the Security Officer) is responsible for keeping the community aware of bugs, exploits and security risks affecting the FreeBSD src and ports trees, and to promote and distribute information needed to safely run FreeBSD systems. Furthermore, it is responsible for resolving software bugs affecting the security of FreeBSD and issuing security advisories. The FreeBSD Security Officer Charter describes the duties and responsibilities of the Security Officer in greater detail.

Vendor Relations Team <vendor-relations@FreeBSD.org>

Vendor relations.


Core Team Secretary <core-secretary@FreeBSD.org>

The FreeBSD Core Team Secretary is a non-voting member of the Core Team, responsible for documenting the work done by core, keeping track of the core agenda, direct contact with non-core members sending mail to core and to be an the interface to the admin team for committer/account approval. The Core Team Secretary is also responsible for writing and sending out monthly status reports to the FreeBSD Developer community, containing a summary of core's latest decisions and actions.

Port Management Team Secretary <portmgr-secretary@FreeBSD.org>

The FreeBSD Port Management Team Secretary is a non-voting member of the Port Management Team, responsible for documenting the work done by portmgr, keeping track of voting procedures, and to be an interface to the other teams, especially the admin and Core teams. The Port Management Team Secretary is also responsible for writing and sending out monthly status reports to the FreeBSD Developer community, containing a summary of portmgr's latest decisions and actions.

Security Team Secretary <secteam-secretary@FreeBSD.org>

The FreeBSD Security Team Secretary will make sure someone responds to incoming emails towards the Security Team. He will acknowledge receipt and keep track of the progress within the Security Team. If needed the Secretary will contact members of the Security Team to let them provide an update on ongoing items. Currently the Security Team Secretary does not handle Security Officer Team items.


Accounts Team <accounts@>

The Accounts Team is responsible for setting up accounts for new committers in the project. Requests for new accounts will not be acted upon without the proper approval from the appropriate entity.

Backups Administrators <backups@>

The Backups Administrators handle all backups on the FreeBSD cluster.

Bugmeisters & GNATS Administrators <bugmeister@FreeBSD.org>

The Bugmeisters and GNATS Administrators are responsible for ensuring that the maintenance database is in working order, that the entries are correctly categorised and that there are no invalid entries. They are also responsible for the problem report group.

Cluster Administrators <clusteradm@>

The Cluster Administrators consists of the people responsible for administrating the machines that the project relies on for its distributed work and communication to be synchronised. It consists mainly of those people who have physical access to the servers. Issues concerning the projects infrastructure or setting up new machines should be directed to the cluster admnistrators.

CVS doc/www Repository Managers <dcvs@FreeBSD.org>

The CVS doc/www Repository Managers are allowed to directly modify the repository without using the CVS tool. It is their responsibility to ensure that technical problems that arise in the repository are resolved quickly. The CVS doc/www repository managers have the authority to back out commits if this is necessary to resolve a CVS technical problem. Repo-copy requests should be directed to the repository managers.

CVS ports Repository Managers <pcvs@FreeBSD.org>

The CVS ports Repository Managers are allowed to directly modify the repository without using the CVS tool. It is their responsibility to ensure that technical problems that arise in the repository are resolved quickly. The CVS ports repository managers have the authority to back out commits if this is necessary to resolve a CVS technical problem. Repo-copy requests should be directed to the repository managers.

CVS src Repository Managers <ncvs@FreeBSD.org>

The CVS src Repository Managers are allowed to directly modify the repository without using the CVS tool. It is their responsibility to ensure that technical problems that arise in the repository are resolved quickly. The CVS source repository managers have the authority to back out commits if this is necessary to resolve a CVS technical problem. Repo-copy requests should be directed to the repository managers.

CVSup Mirror Site Coordinators <cvsup-master@FreeBSD.org>

The CVSup Mirror Site Coordinators coordinates all the CVSup mirror site adminstrators to ensure that they are distributing current versions of the software, that they have the capacity to update themselves when major updates are in progress, and making it easy for the general public to find their closest CVSup mirror.

DNS Administrators <dnsadm@>

The DNS Administrators are responsible for managing DNS and related services.

FTP/WWW Mirror Site Coordinators <mirror-admin@FreeBSD.org>

The FTP/WWW Mirror Site Coordinators coordinate all the FTP/WWW mirror site adminstrators to ensure that they are distributing current versions of the software, that they have the capacity to update themselves when major updates are in progress, and making it easy for the general public to find their closest FTP/WWW mirror.

Perforce Repository Administrators <perforce-admin@FreeBSD.org>

The Perforce Repository Administrators are responsible for administrating the FreeBSD perforce source repository and setting up new perforce accounts. All requests concerning new perforce accounts for non-committers should be directed to the perforce administrators.

Postmaster Team <postmaster@FreeBSD.org>

The Postmaster Team is responsible for mail being correctly delivered to the committers' email address, ensuring that the mailing lists work, and should take measures against possible disruptions of project mail services, such as having troll-, spam- and virus-filters.

Reference Systems Administrators <refadm@>

The Reference Systems Administrators are responsible for administrating, upgrading and maintaining the reference systems in the FreeBSD cluster. These systems are available to all FreeBSD committers.

Webmaster Team <webmaster@FreeBSD.org>

The FreeBSD Webmaster Team is responsible for keeping the main FreeBSD web sites up and running. This means web server configuration, CGI scripts, fulltext and mailing list search. Anything web related, technical stuff belongs to the scope of the Webmaster Team, excluding bugs in the documentation.

&footer; diff --git a/en/developers.sgml b/en/developers.sgml index f681c479b5..2e374bdf7d 100644 --- a/en/developers.sgml +++ b/en/developers.sgml @@ -1,580 +1,580 @@ - + diff --git a/en/security/security.sgml b/en/security/security.sgml index 5886fd389c..249a759abc 100644 --- a/en/security/security.sgml +++ b/en/security/security.sgml @@ -1,326 +1,321 @@ - + %developers; ]> - + &header;

Introduction

This web page is designed to assist both new and experienced users in the area of FreeBSD security. FreeBSD takes security very seriously and is constantly working on making the OS as secure as possible.

Here you will find additional information, or links to information, on how to protect your system against various types of attack, on whom to contact if you find a security-related bug, and so on. There is also a section on the various ways that the systems programmer can become more security conscious so that he is less likely to introduce vulnerabilities.

Table of Contents

All FreeBSD Security issues should be reported to the FreeBSD Security Team or, if a higher level of confidentiality is required, to the Security Officer Team. All reports should at least contain:

After this information has been reported the Security Officer or a Security Team delegate will get back with you.

The FreeBSD Security Officer and the Security Officer Team

To better coordinate information exchange with others in the security community, FreeBSD has a focal point for security-related communications: the FreeBSD Security Officer.

If you need to contact the FreeBSD Project about a possible security issue, you should therefore send mail to the Security Officer with a description of what you have found and the type of vulnerability it represents.

In order that the FreeBSD Project may respond to vulnerability reports in a timely manner, there are four members of the Security Officer mail alias: the Security Officer, Security Officer Emeritus, Deputy Security Officer, and one Core Team member. Therefore, messages sent to the <security-officer@FreeBSD.org> mail alias are currently delivered to:

- - - -
&a.cperciva; <cperciva@FreeBSD.org> Security Officer
&a.nectar; <nectar@FreeBSD.org>Security Officer Emeritus
&a.simon; <simon@FreeBSD.org> Deputy Security Officer
&a.rwatson; <rwatson@FreeBSD.org> FreeBSD Core Team liaison, Release Engineering liaison,
TrustedBSD Project liaison, system security architecture expert

The Security Officer is supported by the FreeBSD Security Team <secteam@FreeBSD.org>, a small group of committers vetted by the Security Officer.

Please use the Security Officer PGP key to encrypt your messages to the Security Officer when appropriate.

Information handling policies

As a general policy, the FreeBSD Security Officer favors full disclosure of vulnerability information after a reasonable delay to permit safe analysis and correction of a vulnerability, as well as appropriate testing of the correction, and appropriate coordination with other affected parties.

The Security Officer will notify one or more of the FreeBSD Cluster Admins of vulnerabilities that put the FreeBSD Project's resources under immediate danger.

The Security Officer may bring additional FreeBSD developers or outside developers into discussion of a submitted security vulnerability if their expertise is required to fully understand or correct the problem. Appropriate discretion will be exercised to minimize unnecessary distribution of information about the submitted vulnerability, and any experts brought in will act in accordance of Security Officer policies. In the past, experts have been brought in based on extensive experience with highly complex components of the operating system, including FFS, the VM system, and the network stack.

If a FreeBSD release process is underway, the FreeBSD Release Engineer may also be notified that a vulnerability exists, and its severity, so that informed decisions may be made regarding the release cycle and any serious security bugs present in software associated with an up-coming release. If requested, the Security Officer will not share information regarding the nature of the vulnerability with the Release Engineer, limiting information flow to existence and severity.

The FreeBSD Security Officer has close working relationships with a number of other organizations, including third-party vendors that share code with FreeBSD (the OpenBSD, NetBSD and DragonFlyBSD projects, Apple, and other vendors deriving software from FreeBSD, as well as the Linux vendor security list), as well as organizations that track vulnerabilities and security incidents, such as CERT. Frequently vulnerabilities may extend beyond the scope of the FreeBSD implementation, and (perhaps less frequently) may have broad implications for the global networking community. Under such circumstances, the Security Officer may wish to disclose vulnerability information to these other organizations: if you do not wish the Security Officer to do this, please indicate so explicitly in any submissions.

Submitters should be careful to explicitly document any special information handling requirements.

If the submitter of a vulnerability is interested in a coordinated disclosure process with the submitter and/or other vendors, this should be indicated explicitly in any submissions. In the absence of explicit requests, the FreeBSD Security Officer will select a disclosure schedule that reflects both a desire for timely disclosure and appropriate testing of any solutions. Submitters should be aware that if the vulnerability is being actively discussed in public forums (such as bugtraq), and actively exploited, the Security Officer may choose not to follow a proposed disclosure timeline in order to provide maximum protection for the user community.

Submissions may be protected using PGP. If desired, responses will also be protected using PGP.

FreeBSD Security Advisories

The FreeBSD Security Officer provides security advisories for several branches of FreeBSD development. These are the -STABLE Branches and the Security Branches. (Advisories are not issued for the -CURRENT Branch.)

Issues affecting the FreeBSD Ports Collection are covered in the FreeBSD VuXML document.

Each branch is supported by the Security Officer for a limited time only, and is designated as one of `Early adopter', `Normal', or `Extended'. The designation is used as a guideline for determining the lifetime of the branch as follows.

Early adopter
Releases which are published from the -CURRENT branch will be supported by the Security Officer for a minimum of 6 months after the release.
Normal
Releases which are published from a -STABLE branch will be supported by the Security Officer for a minimum of 12 months after the release.
Extended
Selected releases will be supported by the Security Officer for a minimum of 24 months after the release.

The current designation and estimated lifetimes of the currently supported branches are given below. The Estimated EoL (end-of-life) column gives the earliest date on which that branch is likely to be dropped. Please note that these dates may be extended into the future, but only extenuating circumstances would lead to a branch's support being dropped earlier than the date listed.

Branch Release Type Release Date Estimated EoL
RELENG_5 n/a n/a n/a May 31, 2008
RELENG_5_5 5.5-RELEASE Extended May 25, 2006 May 31, 2008
RELENG_6 n/a n/a n/a last release + 2 years
RELENG_6_1 6.1-RELEASE Extended May 9, 2006 May 31, 2008
RELENG_6_2 6.2-RELEASE Normal January 15, 2007 January 31, 2008

Older releases are not maintained and users are strongly encouraged to upgrade to one of the supported releases mentioned above.

Some statistics about advisories released during 2002:

Advisories are sent to the following FreeBSD mailing lists:

Advisories are always signed using the FreeBSD Security Officer PGP key and are archived, along with their associated patches, at our FTP CERT repository. At the time of this writing, the following advisories are currently available (note that this list may be a few days out of date - for the very latest advisories please check the FTP site):

&advisories.html.inc; &footer;