Bitmessage project looking for auditors/security experts #1136

Open
opened 2018-02-15 17:12:01 +01:00 by PeterSurda · 11 comments
PeterSurda commented 2018-02-15 17:12:01 +01:00 (Migrated from github.com)
Details on reddit: https://www.reddit.com/r/bitmessage/comments/7xrb80/bitmessage_project_looking_for_auditors_andor/
KOLANICH commented 2018-02-15 22:48:32 +01:00 (Migrated from github.com)

1 The project uses pickle. Pickle is insecure and can be used to inject code. Anyone with permissions to write into these files can inject code. It is unexpected and can be used as a stealthy backdoor. I recommend as a hardening measure not to use pickle. For example you can replace pickle with sqlite, json, bson or msgpack, you will need some serializing and deserializing code.
2 eliminate eval as a hardening measure. It doesn't matter if it is exploitable or not, eval is evil and must not be used. Evals are bad for both performance and security. You must remove it. Again, I don't care about your excuses, all the evals must be removed.

1 The project uses [pickle](https://github.com/Bitmessage/PyBitmessage/search?utf8=%E2%9C%93&q=pickle). Pickle is insecure and can be used to inject code. Anyone with permissions to write into these files can inject code. It is unexpected and can be used as a stealthy backdoor. I recommend as a hardening measure not to use pickle. For example you can replace pickle with sqlite, json, bson or msgpack, you will need some serializing and deserializing code. 2 eliminate eval as a hardening measure. It doesn't matter if it is exploitable or not, eval is evil and must not be used. Evals are bad for both performance and security. You must remove it. Again, I don't care about your excuses, all the `eval`s must be removed.
KOLANICH commented 2018-02-15 22:58:02 +01:00 (Migrated from github.com)
3 What is https://github.com/Bitmessage/PyBitmessage/blob/master/src/protocol.py#L236 and https://github.com/Bitmessage/PyBitmessage/blob/master/src/class_receiveDataThread.py#L841
KOLANICH commented 2018-02-15 23:20:01 +01:00 (Migrated from github.com)

4 https://github.com/Bitmessage/PyBitmessage/blob/master/src/api.py#L134
Check if timing attack possible here. Also keep in mind that passwords are obsolete and must not be used. Challenge-response protocols are preferred.

4 https://github.com/Bitmessage/PyBitmessage/blob/master/src/api.py#L134 Check if timing attack possible here. Also keep in mind that passwords are obsolete and must not be used. Challenge-response protocols are preferred.
PeterSurda commented 2018-02-15 23:21:50 +01:00 (Migrated from github.com)

@KOLANICH I do have my own ideas about what to do. I'm however looking for someone to do it. If I had more time, I'd do it myself.

  1. Yes, I don't like pickle and abstracted parts of the code to a separate file, now someone needs to refactor it into a class that has its own, safer, storage.

  2. Yes, there are two or three more places with eval, they must be run by someone who already has access to the system so it was a lower priority to fix than the remote execute vulnerability.

  3. class_receiveDataThread.py is inactive code and should be removed, the line you reference in protocol.py is also inactive, I just had it there for backwards compatibility as I was changing the code around it. In 0.6.2, PyBitmessage had an random ID that persisted over runtime, to identify if it's connected to itself. Now the ID is unique for each connection.

@KOLANICH I do have my own ideas about what to do. I'm however looking for someone to do it. If I had more time, I'd do it myself. 1. Yes, I don't like pickle and abstracted parts of the code to a separate file, now someone needs to refactor it into a class that has its own, safer, storage. 2. Yes, there are two or three more places with eval, they must be run by someone who already has access to the system so it was a lower priority to fix than the remote execute vulnerability. 3. `class_receiveDataThread.py` is inactive code and should be removed, the line you reference in `protocol.py` is also inactive, I just had it there for backwards compatibility as I was changing the code around it. In 0.6.2, PyBitmessage had an random ID that persisted over runtime, to identify if it's connected to itself. Now the ID is unique for each connection.
PeterSurda commented 2018-02-15 23:27:54 +01:00 (Migrated from github.com)
  1. Good point
4. Good point
KOLANICH commented 2018-02-15 23:33:15 +01:00 (Migrated from github.com)

5 in https://github.com/Bitmessage/PyBitmessage/blob/master/src/bitmsghash/bitmsghash.cpp macrodefinitions are used. It's just dirty and can obfuscate the things going on in code. Macrodefinitions must be avoided, modern C++ must be used instead.

5 in https://github.com/Bitmessage/PyBitmessage/blob/master/src/bitmsghash/bitmsghash.cpp macrodefinitions are used. It's just dirty and [can obfuscate the things going on in code](https://www.reddit.com/r/ProgrammerHumor/comments/4fb7ps/happy_debugging_suckers/). Macrodefinitions must be avoided, modern C++ must be used instead.
KOLANICH commented 2018-02-16 07:31:21 +01:00 (Migrated from github.com)

6
https://github.com/Bitmessage/PyBitmessage/blob/master/src/messagetypes/init.py#L18

Again, you mustn't import based on remote data. Though it is unexploitable because of check, you must remember that such approach must not be used anywhere. Just prepopulate the dict and select from it. The checking of presense of an item in a list is bad for performance.

6 https://github.com/Bitmessage/PyBitmessage/blob/master/src/messagetypes/__init__.py#L18 Again, you mustn't import based on remote data. Though it is unexploitable because of check, you must remember that such approach must not be used anywhere. Just prepopulate the dict and select from it. The checking of presense of an item in a list is bad for performance.
KOLANICH commented 2018-02-16 07:39:49 +01:00 (Migrated from github.com)
7 https://github.com/Bitmessage/PyBitmessage/blob/master/src/class_addressGenerator.py#L110 Why do you use ripemd?
PeterSurda commented 2018-02-16 14:30:26 +01:00 (Migrated from github.com)

@KOLANICH Are you going to apply?

@KOLANICH Are you going to apply?
KOLANICH commented 2018-02-16 14:47:17 +01:00 (Migrated from github.com)

I'm not.

I'm not.
sigoa commented 2018-03-22 18:37:03 +01:00 (Migrated from github.com)

In light of the recent vulnerability I am looking for experts to audit the code, improve its security and write configuration for security platforms like firejail, apparmor and SElinux.

Applicants please post here in this thread. If you don't want to post publicly, you can contact me privately and we'll discuss how to best apply. An application should contain:

what is your motivation for the application

a list of verifiable references of doing similar work (e.g. employer or an open source project)

if the auditing wasn't done with python, verifiable references to experience with python

a rough proposal for how you would proceed, with an ordered list of tasks (or just sorted into categories like short-term/medium-term/long-term)

if you want, you can post publicly how much €€$$ you want, if you don't, I can discuss it privately

no place for newbies, I presume.

> In light of the recent vulnerability I am looking for experts to audit the code, improve its security and write configuration for security platforms like firejail, apparmor and SElinux. > > Applicants please post here in this thread. If you don't want to post publicly, you can contact me privately and we'll discuss how to best apply. An application should contain: > > what is your motivation for the application > > a list of verifiable references of doing similar work (e.g. employer or an open source project) > > if the auditing wasn't done with python, verifiable references to experience with python > > a rough proposal for how you would proceed, with an ordered list of tasks (or just sorted into categories like short-term/medium-term/long-term) > > if you want, you can post publicly how much €€$$ you want, if you don't, I can discuss it privately no place for newbies, I presume.
This repo is archived. You cannot comment on issues.
No Milestone
No project
No Assignees
1 Participants
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: Bitmessage/PyBitmessage-2024-12-22#1136
No description provided.