[184191] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Security release scheduling

daemon@ATHENA.MIT.EDU (Barry Greene)
Tue Sep 29 03:39:51 2015

X-Original-To: nanog@nanog.org
From: Barry Greene <bgreene@senki.org>
In-Reply-To: <560A13E6.7060509@nwtime.org>
Date: Tue, 29 Sep 2015 15:39:57 +0800
To: Harlan Stenn <stenn@nwtime.org>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

>=20
> Hi Harlan,

The general principle is look out for the major network lock downs. Some tim=
es that is overlap with holidays. Other times it is over financial close mon=
ths.

My personal $.02 is to avoid major vulnerability disclosures in December, du=
ring Lunar New Year weeks, during Ramadan, and June. Some would also include=
 August (Euro holidays).

But these days there are timers given by the vulnerability finder (or CERT T=
eam) and conference disclosures (security rock stars) that drive the disclos=
ure to a time which is not optimal to the people who have to roll out the re=
mediation.=20

In essence, write a disclose policy, put it on your website, and be open for=
 improvements based on input from your constituents. Do your best. That is a=
ll your can do.

Barry

PS - Let me know if you need help writing the disclosure policy.=20



home help back first fref pref prev next nref lref last post