TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The “security.txt” proposal reached last step in the IETF process

221 pointsby nwcsover 5 years ago

15 comments

rahuldottechover 5 years ago
For the uninitiated: <a href="https:&#x2F;&#x2F;securitytxt.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;securitytxt.org&#x2F;</a><p>Original HN thread: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=15416198" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=15416198</a>
评论 #21767608 未加载
评论 #21767449 未加载
tptacekover 5 years ago
I know Google, Facebook, and Github now have this, though Apple, Microsoft, Amazon, Stripe, and Square do not (to rattle off the other tech companies with huge security teams.)<p>But I don&#x27;t really get it. Why is this a good idea?<p>As &#x27;DyslexicAtheist related, if you put this page on your site, people will crawl for it and find you, and then kick off horrible automated scanners that generate bogus bugs on every site they check, and then submit bounty requests for them.<p>Meanwhile: what serious tester would be impeded by not having this page to refer to, if you have a &#x2F;security page on your main site, which you have to have anyways for this to work? Recall that most of the fields in security.txt are themselves just URL pointers.<p>I also think the RFC itself is kind of funny. Do not rely on security.txt as authorization to test a site! it says, as if an RFC really had the authority to establish that, rather than an expensive court case in which both sides of the argument will have competing claims about whether testing was allowed or (the US default) not.
评论 #21768712 未加载
评论 #21769216 未加载
评论 #21770603 未加载
评论 #21769006 未加载
评论 #21769011 未加载
评论 #21768761 未加载
cstuderover 5 years ago
A list of all official .well-known files and paths:<p><a href="https:&#x2F;&#x2F;www.iana.org&#x2F;assignments&#x2F;well-known-uris&#x2F;well-known-uris.xhtml" rel="nofollow">https:&#x2F;&#x2F;www.iana.org&#x2F;assignments&#x2F;well-known-uris&#x2F;well-known-...</a><p>Wikipedia knows some less official ones too:<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;List_of_&#x2F;.well-known&#x2F;_services_offered_by_webservers" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;List_of_&#x2F;.well-known&#x2F;_services...</a>
评论 #21770366 未加载
评论 #21770374 未加载
mikeiz404over 5 years ago
If you’re looking for an example security.txt, you can have a look at <a href="https:&#x2F;&#x2F;www.google.com&#x2F;.well-known&#x2F;security.txt" rel="nofollow">https:&#x2F;&#x2F;www.google.com&#x2F;.well-known&#x2F;security.txt</a>.<p>There is also this site which lets you create create a security.txt file by filling out some fields: <a href="https:&#x2F;&#x2F;securitytxt.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;securitytxt.org&#x2F;</a>
tareqakover 5 years ago
I think it is great that this proposal is almost done getting through the process.<p>I also think there should be a similar file for the regular expression that expresses a site’s allowable passwords.
评论 #21767042 未加载
评论 #21767493 未加载
评论 #21767339 未加载
评论 #21770801 未加载
评论 #21767059 未加载
评论 #21768800 未加载
评论 #21769217 未加载
评论 #21767479 未加载
nwcsover 5 years ago
Comments should be directed to the IETF last-call list via email: last-call@ietf.org<p>List info: <a href="https:&#x2F;&#x2F;www.ietf.org&#x2F;mailman&#x2F;listinfo&#x2F;last-call" rel="nofollow">https:&#x2F;&#x2F;www.ietf.org&#x2F;mailman&#x2F;listinfo&#x2F;last-call</a><p>Guidance on the last call process: <a href="https:&#x2F;&#x2F;ietf.org&#x2F;about&#x2F;groups&#x2F;iesg&#x2F;statements&#x2F;last-call-guidance&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ietf.org&#x2F;about&#x2F;groups&#x2F;iesg&#x2F;statements&#x2F;last-call-guid...</a><p>Archive of comments so far: <a href="https:&#x2F;&#x2F;mailarchive.ietf.org&#x2F;arch&#x2F;msg&#x2F;last-call&#x2F;aDZq1M-m4du-wN5b58puSQ_7y2M" rel="nofollow">https:&#x2F;&#x2F;mailarchive.ietf.org&#x2F;arch&#x2F;msg&#x2F;last-call&#x2F;aDZq1M-m4du-...</a>
alasdair_over 5 years ago
An interesting attack for any website that allows customers to choose their own string for use in the url would be to choose the name &quot;.well-known&quot; - I&#x27;m sure I&#x27;ve seen sites that take user input and create a folder based on that name. Similar to reddit.com&#x2F;r&#x2F;.well-known except as a top-level folder but I can&#x27;t find a good example right now.<p>Once that happens, they could put up a malicious security.txt file and get free security reports sent to an email of their choice.
评论 #21768253 未加载
评论 #21770685 未加载
评论 #21770336 未加载
评论 #21768193 未加载
arminiusreturnsover 5 years ago
I actually think this is a great proposal. I may start implementing it regardless.
jillesvangurpover 5 years ago
I think this is nice but having this in and a lot of other meta data in a machine readable form would be nicer. You could also think of things like licenses a and copyrights.<p>Technically, the problem this specification solves is making it easier to find security related metadata for projects that typically have this information already but just not an easy to find place. So, the next logical step would be making this machine readable so IDEs, project hosting websites, and other tools, can do the right things instead of having to parse files intended for humans with no consistently used syntax.
评论 #21769539 未加载
quotemstrover 5 years ago
What&#x27;s wrong with emailing webmaster@domain.tld?
评论 #21769166 未加载
评论 #21769014 未加载
technionover 5 years ago
For people discussing automated tools and noise, prediction: we will start seeing automated tools flagging &quot;missing security.txt&quot; as some sort of vulnerability and I will end up implementing it just to stop the noise. It feels like a lose-lose situation.
_pmf_over 5 years ago
From a liability point of view, this only has downsides for a &quot;target&quot; company.
superkuhover 5 years ago
Okay. I implemented it on my main domain for kicks. I wonder how long until bots begin looking for it.
disconnectedover 5 years ago
This seems like a really poorly thought out proposal.<p>From the draft&#x27;s [1] intro, which provides motivation for the proposal:<p>&gt; When security vulnerabilities are discovered by independent security researchers, they often lack the channels to report them properly [...]<p>Occam&#x27;s Razor: they lack the channel to report those vulnerabilities because the company doesn&#x27;t give a damn about security, not because of some hitherto unsolved technical difficulty.<p>Companies that give a damn about security already have either a &quot;catch-all&quot; contact for security related things displayed on their contacts page, or have dedicated pages detailing what the hell you are supposed to do to report a vulnerability. Companies that don&#x27;t give a damn will continue to not give a damn and will ignore your document, and will continue to suck at security until someone starts punishing them - monetarily - for such appalling behavior.<p>But let&#x27;s leave that aside for a moment. Researchers spot vulnerabilities. Need a way to report them. So what&#x27;s the solution?<p>Apparently, a text file with only one mandatory field...<p>&gt; 3.5.3. Contact<p>&gt; This directive indicates an address that researchers should use for reporting security vulnerabilities. The value MAY be an email address, a phone number and&#x2F;or a web page with contact information.<p>...which contains... er... a catch-all contact for security related things and or a link to a contacts page detailing exactly what the hell you are supposed to do to report a vulnerability? sigh...<p>But the real kicker is that that the standard doesn&#x27;t even require that the contact information is up to date or valid:<p>&gt; 6.2. Incorrect or Stale Information<p>&gt; [...] Organizations SHOULD ensure that information in this file and any referenced resources such as web pages, email addresses and telephone numbers are kept current, are accessible, controlled by the organization, and are kept secure.<p>In case the meaning of &quot;SHOULD&quot; is in question see RFC 2119 [2], but basically, they &quot;strongly recommend&quot; that you keep your contact information up to day - instead of, I dunno, REQUIRING it, since having a channel to properly report security vulnerabilities is the ENTIRE POINT of this exercise?<p>&#x2F;facepalm<p>Are we really supposed to take this seriously? This is simply security theater.<p>[1] <a href="https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-foudil-securitytxt-08" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;draft-foudil-securitytxt-08</a><p>[2] <a href="https:&#x2F;&#x2F;www.ietf.org&#x2F;rfc&#x2F;rfc2119.txt" rel="nofollow">https:&#x2F;&#x2F;www.ietf.org&#x2F;rfc&#x2F;rfc2119.txt</a>
评论 #21768688 未加载
phkampover 5 years ago
My first thought was &quot;XKCD 463&quot;