-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Dear Qubes Community,

As we recently announced, Joanna Rutkowska [01] has turned over
leadership of the Qubes OS Project to Marek Marczykowski-Górecki [02]
(see Joanna's announcement [03] and Marek's announcement [04]). In this
post, we'll discuss the implications of these changes for the Qubes
Security Team and how we're addressing them.


What is the Qubes Security Team?
- --------------------------------

The Qubes Security Team (QST) [05] is the subset of the Qubes Team [06]
that is responsible for ensuring the security of Qubes OS and the Qubes
OS Project. In particular, the QST is responsible for:

 - Responding to reported security issues [07]
 - Evaluating whether Xen Security Advisories (XSAs) [08] affect the
   security of Qubes OS
 - Writing, applying, and/or distributing security patches to fix
   vulnerabilities in Qubes OS
 - Writing, signing, and publishing Qubes Security Bulletins (QSBs) [09]
 - Writing, signing, and publishing Qubes Canaries [10]
 - Generating, safeguarding, and using the project's PGP keys [11]

As a security-oriented operating system, the QST is fundamentally
important to Qubes, and every Qubes user implicitly trusts the members
of the QST by virtue of the actions listed above.


How does the recent change in leadership affect the QST?
- --------------------------------------------------------

Until now, the two members of the QST have been Joanna and Marek. With
Joanna's new role at the Golem Project, she will no longer have time to
function as a QST member. Therefore, Joanna will officially transfer
ownership of the Qubes Master Signing Key (QMSK) [12] to Marek, and she
will no longer sign QSBs.

However, due to the nature of PGP keys, there is no way to guarantee
that Joanna will not retain a copy of the QMSK after transferring
ownership to Marek. Since anyone in possession of the QMSK is a
potential attack vector against the project, Joanna will continue to
sign Qubes Canaries [10] in perpetuity.

With Joanna's departure from the QST, Marek would remain as its sole
member. Given the critical importance of the QST to the project,
however, we believe that a single member would be insufficient.
Therefore, after careful consideration, we have selected a new member
for the QST from among our experienced Qubes Team members: Simon Gaiser
(aka HW42) [13].


About Simon
- -----------

Simon has been a member of the Qubes Team for over two years and has
been a contributor to the project since 2014. He has worked on many
different parts of the Qubes codebase, including core, Xen, kernel, and
GUI components. Earlier this year, he joined Invisible Things Lab (ITL)
and has been gaining experience with other security projects. His
thorough knowledge of Qubes OS, ability to assess the severity of
security vulnerabilities, and experience preparing Xen patches make him
very well-suited to the QST. Most importantly, both Joanna and Marek
trust him with the responsibilities of this important role. We are
pleased to announce Simon's new role as a QST member. Congratulations,
Simon, and thank you for working to keep Qubes secure!


[01] https://www.qubes-os.org/team/#joanna-rutkowska
[02] https://www.qubes-os.org/team/#marek-marczykowski-g%C3%B3recki
[03] https://www.qubes-os.org/news/2018/10/25/the-next-chapter/
[04] https://www.qubes-os.org/news/2018/10/25/thank-you-joanna/
[05] https://www.qubes-os.org/security/#the-qubes-security-team
[06] https://www.qubes-os.org/team/
[07] https://www.qubes-os.org/security/#reporting-security-issues-in-qubes-os
[08] https://www.qubes-os.org/security/xsa/
[09] https://www.qubes-os.org/security/bulletins/
[10] https://www.qubes-os.org/security/canaries/
[11] https://keys.qubes-os.org/keys/
[12] 
https://www.qubes-os.org/security/verifying-signatures/#1-get-the-qubes-master-signing-key-and-verify-its-authenticity
[13] https://www.qubes-os.org/team/#simon-gaiser-aka-hw42

This announcement is also available on the Qubes website:
https://www.qubes-os.org/news/2018/11/05/qubes-security-team-update/

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

-----BEGIN PGP SIGNATURE-----
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=7rtv
-----END PGP SIGNATURE-----


-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/434c6b5d-3323-58f4-769d-90a1dd59867d%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to