Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check if any of the security issues are blockers for the MVP, and document the remaining security issues #8049

Closed
Tracked by #7728
teor2345 opened this issue Dec 4, 2023 · 6 comments · Fixed by #8064, #8040 or #8114
Assignees
Labels
A-blockchain-scanner Area: Blockchain scanner of shielded transactions A-docs Area: Documentation C-security Category: Security issues

Comments

@teor2345
Copy link
Contributor

teor2345 commented Dec 4, 2023

No description provided.

@mpguerra
Copy link
Contributor

mpguerra commented Dec 5, 2023

Hey team! Please add your planning poker estimate with Zenhub @arya2 @oxarbitrage @teor2345 @upbqdn

@teor2345 teor2345 added A-docs Area: Documentation P-Medium ⚡ C-security Category: Security issues A-blockchain-scanner Area: Blockchain scanner of shielded transactions labels Dec 5, 2023
@teor2345
Copy link
Contributor Author

teor2345 commented Dec 6, 2023

Our current list of security issues is in the epic, but here's a copy from 7 December:

I have fixed all the places we're actually logging secret keys right now.

@mpguerra mpguerra linked a pull request Dec 11, 2023 that will close this issue
7 tasks
@teor2345 teor2345 self-assigned this Dec 11, 2023
@teor2345 teor2345 linked a pull request Dec 11, 2023 that will close this issue
9 tasks
@teor2345
Copy link
Contributor Author

Here is my take on the security issues:

Partially addressed by warning users not to use the experimental scanner on shared machines.

Server processes that run as other users and are exploited could still read the viewing keys. This is addressed by telling users to generate new keys for testing.

This is addressed by telling users to generate new keys for testing.

There also isn't much of an oracle here, because we're launching blocking cryptographic tasks in their own tokio threads.

Same as "Files created by Zebra can be read by any user".

  • Add a wrapper around private key types, so we never print them in display or debug code

This is addressed by removing all known key writes to logs.

It is also addressed by telling users to generate new keys for testing.

  • Stop repeating the secret key in every database row, this makes it harder to securely delete from disk

Same as "Files created by Zebra can be read by any user".

  • Store the private key in the database as a salted hash, so it can't be read and re-used

Not needed yet.

@mpguerra
Copy link
Contributor

@ZcashFoundation/zebra-team any other input on the security analysis for the MVP? Anything else to be done before we close this issue?

@teor2345
Copy link
Contributor Author

Can someone double-check that the changelog and scanning doc security warnings cover all these cases? And that the warnings are clear and easy to understand?

I think we're fine but it's good to check.

https://github.com/ZcashFoundation/zebra/blob/main/book/src/user/shielded-scan.md
https://github.com/ZcashFoundation/zebra/blob/main/CHANGELOG.md#zebra-150---2023-11-28
https://zfnd.org/zebra-1-5-0-release/

@mpguerra
Copy link
Contributor

Can someone double-check that the changelog and scanning doc security warnings cover all these cases? And that the warnings are clear and easy to understand?

@oxarbitrage Can you please check this? ☝️

@oxarbitrage oxarbitrage self-assigned this Dec 16, 2023
@mergify mergify bot closed this as completed in #8114 Dec 21, 2023
@github-project-automation github-project-automation bot moved this from 🆕 New to ✅ Done in Zebra Dec 21, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
A-blockchain-scanner Area: Blockchain scanner of shielded transactions A-docs Area: Documentation C-security Category: Security issues
Projects
Archived in project
3 participants