GuidelinesDraft

Differences between revisions 4 and 5
Revision 4 as of 2008-02-29 22:29:55
Size: 3582
Editor: bismuth
Comment:
Revision 5 as of 2008-03-03 20:00:38
Size: 3374
Editor: c-76-105-157-155
Comment: tweak intro
Deletions are marked like this. Additions are marked like this.
Line 1: Line 1:
= Brainstorm =

'''keescook''':
 * keep vulns private until fixed
 * people can be team members if they agree to abide by those guidelines

'''nxvl''':
 *not to use dangerous tests, which tools to use
 *not to touch anything if you gain access
 *not to break anything

'''mra''':
 *gpg sign something (guidelines)
 *register that you agreed to it (guidelines)

'''jdstrand''':
 *gpg signed the contents of an email message
 *it's important from a mindset point of view, as well as potentially legal

'''andrea-bs''':
 * gpg sign the content of the reports
 * discuss with other members before doing something dangerous

Line 30: Line 6:
While working in the Ubuntu community, one already follows the Ubuntu Code of Conduct. Those goals include freedom and respect, and we must approach penetration testing with greater caution. We do not want to disrupt the community, and as such, the Ubuntu Penetration Testers Code of Conduct contains strict definitions.

When one agrees to this Code, please GPG sign it and send it to the pentest mailing list.
Line 37: Line 16:
refers to ubuntu.com hosts and subdomains. refers to ubuntu.com hosts, subdomains, and related projects.
Line 66: Line 45:
of care, thought and coordination must happen to responsibly conduct of care, thought, and coordination must happen to responsibly conduct

Ubuntu Pentest Code of Conduct (Draft)

Introduction

"A white hat hacker, also rendered as ethical hacker, is, in the realm of information technology, a person who is ethically opposed to the abuse of computer systems. Realization that the Internet now represents human voices from around the world has made the defense of its integrity an important pastime for many. A white hat generally focuses on securing IT systems, whereas a black hat (the opposite) would like to break into them." http://en.wikipedia.org/wiki/Ethical_hacker

While working in the Ubuntu community, one already follows the Ubuntu Code of Conduct. Those goals include freedom and respect, and we must approach penetration testing with greater caution. We do not want to disrupt the community, and as such, the Ubuntu Penetration Testers Code of Conduct contains strict definitions.

When one agrees to this Code, please GPG sign it and send it to the pentest mailing list.

Ground Rules

This Code of Conduct covers your behaviour as a member of the Ubuntu Pentest team, in any forum, mailing list, wiki, web site, IRC channel, install-fest, public meeting or private correspondence. The Ubuntu Community Council will arbitrate in any dispute over the conduct of a member of the team. In this document COMPANY refers to Canonical Ltd and its subsidiaries. COMMUNITY refers to ubuntu.com hosts, subdomains, and related projects.

Do no harm. Your actions could affect many people and care must be taken to not adversely affect the COMMUNITY and the COMPANY. Causing a COMMUNITY and/or COMPANY service or machine to crash, perform suboptimally, or do actions outside the intended use of the service or machine is strictly prohibited. If you acquire access to the service or machine outside the scope of its intended use, all further action related to said access should be immediately stopped and reported.

Be responsible. All communications regarding penetration testing on COMMUNITY and COMPANY computing services must be done on the private ubuntu-pentest mailing list, and all vulnerabilities must be disclosed immediately on Launchpad.net with both the security and the private flags enabled (ie non-public). Under no circumstances should non-public information about the COMMUNITY or the COMPANY be disclosed in a public forum.

Coordinate with others. All penetration testing on COMMUNITY and/or COMPANY computing services must be by approved by and coordinated with a COMPANY employee or COMMUNITY member responsible for said service.

Be private. All communications regarding coordination of penetration testing on COMMUNITY and COMPANY computing services must be done on the private ubuntu-pentest mailing list. All information regarding a vulnerability on COMMUNITY and/or COMPANY computing services must be done in the private bug report on Launchpad.net. Under no circumstances should non-public information about the COMMUNITY, the COMPANY or a vulnerability be disclosed in a public forum.

When you are unsure, ask for help. Nobody knows everything, and a lot of care, thought, and coordination must happen to responsibly conduct penetration testing. If you find yourself in a situation where you are unsure of how to proceed, please ask another Ubuntu Pentest member before proceeding.

UbuntuPentest/GuidelinesDraft (last edited 2008-08-06 16:18:30 by localhost)