Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

BodyLast challengeCampaign nameNext challengeCampaign nameStatus
IGTFNovember 2015
October 2019IGTF-RATCC4-2019In progress
EGIMarch 2019SSC6 19.03


Campaign information

Campaigns can target different constituencies and may overlap. The description of the constituency given here should be sufficient for a human to asses if there is a significant overlap in community, it need not be a detailed description or a list of addresses (which would be a privacy concern since this page is public). Challenges can also probe to different 'depths': anywhere from just checking if a contact address does not bounce, to testing if the organisation contacted can do system memory forensic analysis and engage effectively with LE. The proposed rough classification is now:

  • ability to receive – mail does not bounce or phone rings
  • automated answering – ticket system receipt or answering machine
  • human responding – a human (helpdesk operative) answers trivially (e.g. name)
  • human familiar with subject-matter responding – responsible person responds
  • service analysis capability - a responsible person or team can investigate and resolve common incidents reported to the contact address (forensics, log processing, &c)

See also for some background.

Please do not post sensitive data to this Wiki - it is publicly viewable for now.


PeriodOctober 2019
Initiator contactInteroperable Global Trust Federation IGTF (
Target communityIGTF Accredited Identity Providers

Target type

own constituency of accredited authorities
Target community size~80 entities, ~60 organisations, ~50 countries/economic areas
Challenge format and depthemail to registered public contacts
expecting human response (by email reply) within policy timeframe
Current phasePreparatory communications sent
Summary or reportnot yet available

EGI Security Service Challenge 6 (19.03)

PeriodMarch 2019
Initiator contactEGI CSIRT (
Target communityEGI Federation members: service providers and selected user communities

Target type

own constituency of service providers
Target community size~70 organisations, ~14 countries/IOs
Challenge format and depth

simulated user-level system intrusion using (non-weaponized) crafted malware

expecting communications with federation CSIRT, log analysis and correlation, and forensic investigation

should follow established procedures and communications reponse deadlines

Current phaseCompleted
Summary or report

summary available upon request

description of challenge format and malware publicly available:

  • No labels