Thank you to @unman for the initial sentence case pass.
3.5 KiB
lang | layout | permalink | redirect_from | ref | title | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
en | doc | /security/ |
|
217 | Qubes OS project security center |
This page provides a central hub for topics pertaining to the security of the Qubes OS Project. For topics pertaining to software security within Qubes OS, see Security in Qubes. The following is a list of important project security pages:
- Qubes Security Pack (
qubes-secpack
) - Qubes Security Bulletins (QSBs)
- Qubes Canaries
- Xen Security Advisory (XSA) Tracker
- Verifying signatures
- PGP keys
- Security FAQ
Reporting Security Issues in Qubes OS
If you believe you have found a security issue affecting Qubes OS, either directly or indirectly (e.g., the issue affects Xen in a configuration that is used in Qubes OS), then we would be more than happy to hear from you! Please send a PGP-encrypted email to the Qubes Security Team. We promise to take all reported issues seriously. If our investigation confirms that an issue affects Qubes, we will patch it within a reasonable time and release a public Qubes Security Bulletin (QSB) that describes the issue, discusses the potential impact of the vulnerability, references applicable patches or workarounds, and credits the discoverer.
Security Updates
Qubes security updates are obtained by updating Qubes OS.
Qubes Security Team
The Qubes Security Team (QST) is the subset of the Core Qubes Team that is responsible for ensuring the security of Qubes OS and the Qubes OS Project. In particular, the QST is responsible for:
- Responding to reported security issues
- Evaluating whether XSAs affect the security of Qubes OS
- Writing, applying, and/or distributing security patches to fix vulnerabilities in Qubes OS
- Writing, signing, and publishing Qubes Security Bulletins (QSBs)
- Writing, signing, and publishing Qubes Canaries
- Generating, safeguarding, and using the project's PGP keys
As a security-oriented operating system, the QST is fundamentally important to Qubes, and every Qubes user implicitly trusts the members of the QST by virtue of the actions listed above. The Qubes Security Team can be contacted via email at the following address:
security at qubes-os dot org
Security Team PGP Key
Please use the Security Team PGP Key to encrypt all emails sent to this address. This key is signed by the Qubes Master Signing Key. Please see Verify Signatures for information about how to authenticate these keys.