Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/nextcloud/nextcloud.com.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLukas Reschke <lukas@owncloud.com>2016-06-16 12:56:25 +0300
committerLukas Reschke <lukas@owncloud.com>2016-06-16 12:56:25 +0300
commit17c4f09b64ca2f62f8aa43a58c76f994e44cc50c (patch)
treeb8cb688681d5959da031c708a624da5ccdfef91d /page-threat-model.php
parent1d6b9fab5fbf6ce007e8b75775d82ff80fba1d43 (diff)
Add some security pages
Diffstat (limited to 'page-threat-model.php')
-rw-r--r--page-threat-model.php41
1 files changed, 41 insertions, 0 deletions
diff --git a/page-threat-model.php b/page-threat-model.php
new file mode 100644
index 00000000..6e54904f
--- /dev/null
+++ b/page-threat-model.php
@@ -0,0 +1,41 @@
+<?php get_template_part( 'templates/parts/title'); ?>
+<h2>Threat model & accepted risks</h2>
+<p>This page is constantly evolving. So check back over time to see new additions.</p>
+
+<h3>Administrator privileges</h3>
+<p>We consider Nextcloud administrators ultimately trusted. It is for example expected behaviour that a Nextcloud
+administrator can execute arbitrary code.</p>
+<p>While we're working on adding constantly more hardenings at the moment to end at some point with a solution where
+administrators are not able to execute arbitrary code at the moment this is the expected behaviour.</p>
+
+<h3>Denial of Service</h3>
+<p>Due to the usage of the PHP scripting language we do consider Denial of Service not something that can at the moment be
+completely prevented. See also the article "<a href="http://lukasmartinelli.ch/web/2014/11/17/php-dos-attack-revisited.html">PHP Denial of Service Attack Revisited</a>".</p>
+<p>For this reason while we do fix and acknowledge specific Denial of Service attacks we do generally not consider DoS a bounty-worthy
+vulnerability.</p>
+
+<h3>Local external storages are considered trusted</h3>
+<p>We do consider local mounted storages as trusted, so if a symlink or something else is configured on the external storage
+the Nextcloud server will follow it with the web server privileges.</p>
+<p>For this reason we do recommend administrators to only use the external storage mount for ultimately trusted content.</p>
+
+<h3>Encryption</h3>
+<p>Nextcloud can be configured to encrypt data at rest. In this scenario we do prevent against storage administrators mainly,
+a Nextcloud administrator could still intercept the user password to manually decrypt the encryption key. We do thus only
+consider attack scenarios bounty-worthy if they include external parties.</p>
+
+<h3>Features intentionally marked as insecure</h3>
+<p>Some features in Nextcloud are intentionally marked as insecure and disabled by default (plus have a big warning above them),
+one example including preview providers such as the LibreOffice preview provider. We do at the moment consider vulnerabilities
+in those features as not bounty-worthy.</p>
+
+<h3>Audit logging</h3>
+<p>The audit logging feature in Nextcloud is at the moment missing some logs for stuff like "Accessing previews of files",
+these will be added in a future release and known issues are tracked in our <a href="https://github.com/nextcloud/server/issues/">issue tracker</a>.</p>
+
+<h3>Attacks involving other Android apps on the device</h3>
+<p>We do consider attacks involving other Android apps on the device as minimal risk, also especially considering that the
+Nextcloud Android apps stores synced files locally accessible on the device. (since no Content Provider is yet implemented)</p>
+
+<h3>Content spoofing</h3>
+<p>In many cases we consider content spoofing not a bonty-worthy vulnerability.</p>