2021-06-06 12:53:28 +07:00
|
|
|
# Security Policy
|
|
|
|
|
|
|
|
## Prologue
|
2020-04-24 07:29:30 +07:00
|
|
|
|
2022-06-15 14:51:47 +07:00
|
|
|
Authelia takes security very seriously. We follow the rule of
|
2021-06-01 11:11:33 +07:00
|
|
|
[responsible disclosure](https://en.wikipedia.org/wiki/Responsible_disclosure), and we urge our community to do so as
|
|
|
|
well instead of making the vulnerability public. This allows time for the security issue to be patched quickly.
|
2020-04-24 07:29:30 +07:00
|
|
|
|
2022-06-15 14:51:47 +07:00
|
|
|
If you discover a vulnerability in Authelia, please first contact one of the maintainers privately as described in the
|
|
|
|
[contact options](#contact-options) below.
|
2021-07-30 11:19:17 +07:00
|
|
|
|
|
|
|
We urge you not to disclose the bug publicly at least until we've had a
|
2022-06-15 14:51:47 +07:00
|
|
|
reasonable chance to fix it, and to clearly communicate any public disclosure timeline in your initial contact with us.
|
2021-07-30 11:19:17 +07:00
|
|
|
If you do not have a particular public disclosure timeline, we will clearly communicate ours as we publish security
|
2022-06-15 14:51:47 +07:00
|
|
|
advisories.
|
2020-04-24 07:29:30 +07:00
|
|
|
|
2022-06-15 14:51:47 +07:00
|
|
|
For more information about [security](https://www.authelia.com/information/security/) related matters, please read
|
|
|
|
[the documentation](https://www.authelia.com/information/security/).
|
2020-05-05 02:39:25 +07:00
|
|
|
|
|
|
|
## Contact Options
|
|
|
|
|
2021-07-30 11:19:17 +07:00
|
|
|
Several [contact options](./README.md#contact-options) exist, it's important to make sure you contact the maintainers
|
|
|
|
privately which is described in each available contact method. The methods include our [security email](./README.md#security),
|
|
|
|
[Matrix](./README.md#matrix), and [Discord](./README.md#discord).
|
2021-06-01 11:11:33 +07:00
|
|
|
|
|
|
|
## Credit
|
|
|
|
|
2022-06-15 14:51:47 +07:00
|
|
|
Users who report bugs will optionally be credited for the discovery. Both in the [security advisory] and in our
|
2021-07-30 11:19:17 +07:00
|
|
|
[all contributors](./README.md#contribute) configuration/documentation.
|
2021-06-01 11:11:33 +07:00
|
|
|
|
|
|
|
## Process
|
|
|
|
|
|
|
|
1. User privately reports a potential vulnerability.
|
2021-06-06 12:53:28 +07:00
|
|
|
2. The core team reviews the report and ascertain if additional information is required.
|
|
|
|
3. The core team reproduces the bug.
|
2021-06-01 11:11:33 +07:00
|
|
|
4. The bug is patched, and if possible the user reporting te bug is given access to a fixed version or git patch.
|
|
|
|
5. The fix is confirmed to resolve the vulnerability.
|
|
|
|
6. The fix is released.
|
2021-07-30 11:19:17 +07:00
|
|
|
7. The [security advisory] is published sometime after users have had a chance to update.
|
2021-06-06 12:53:28 +07:00
|
|
|
|
|
|
|
## Help Wanted
|
|
|
|
|
2022-06-15 14:51:47 +07:00
|
|
|
We are actively looking for sponsorship to obtain either a code security audit, penetration testing, or other audits
|
2021-06-06 12:53:28 +07:00
|
|
|
related to improving the security of Authelia. If your company or you personally are willing to offer discounts, pro
|
|
|
|
bono, or funding towards services like these please feel free to contact us on *any* of the methods above.
|
|
|
|
|
2022-06-15 14:51:47 +07:00
|
|
|
[security advisory]: https://github.com/authelia/authelia/security/advisories
|