Open
Description
The Security Response Committee gets a fair amount of reports about link hijacking, which is basically what you get when a third party project we were linking to disappears or changes its name (surprisingly common...)
We just got a big dump of reports about links on https://kubernetes.io/docs/concepts/cluster-administration/addons/ and https://kubernetes.io/docs/concepts/cluster-administration/networking/. This is a problem because not only are we drawing from our bug bounty fund to pay out bounties for these, but it also increases the load on the security response committee to validate, triage & follow up on these issues.
Brainstorming some possible solutions:
- Exclude these from the bug bounty - Not ideal, as this is still a bad user experience at best, and an attack vector at worst.
- Eliminate or reduce external links - Probably the best solution when it's feasible, but not good when the links are providing value to the users.
- Better detection of removed content - I believe we already have some form of broken link detection in place, but that doesn't work when a domain falls back to the domain registrar (e.g. a "buy this domain" page). An engineering solution could be to cache the TLS certificates, and flag the link for manual review (file an issue?) when the certificate changes. I don't know how much churn this would generate from legitimate cert rotation though.
Other ideas?
/sig security docs
/committee security-response
Metadata
Metadata
Assignees
Labels
Denotes an issue or PR intended to be handled by the product security committee.Issues or PRs related to English languageIndicates that an issue or PR should not be auto-closed due to staleness.Indicates an issue or PR lacks a `triage/foo` label and requires one.Important over the long term, but may not be staffed and/or may need multiple releases to complete.Categorizes an issue or PR as relevant to SIG Docs.Categorizes an issue or PR as relevant to SIG Security.
Type
Projects
Status
Triage Accepted