diff options
author | Lukas Reschke <lukas@owncloud.com> | 2016-06-16 12:56:25 +0300 |
---|---|---|
committer | Lukas Reschke <lukas@owncloud.com> | 2016-06-16 12:56:25 +0300 |
commit | 17c4f09b64ca2f62f8aa43a58c76f994e44cc50c (patch) | |
tree | b8cb688681d5959da031c708a624da5ccdfef91d /page-threat-model.php | |
parent | 1d6b9fab5fbf6ce007e8b75775d82ff80fba1d43 (diff) |
Add some security pages
Diffstat (limited to 'page-threat-model.php')
-rw-r--r-- | page-threat-model.php | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/page-threat-model.php b/page-threat-model.php new file mode 100644 index 00000000..6e54904f --- /dev/null +++ b/page-threat-model.php @@ -0,0 +1,41 @@ +<?php get_template_part( 'templates/parts/title'); ?> +<h2>Threat model & accepted risks</h2> +<p>This page is constantly evolving. So check back over time to see new additions.</p> + +<h3>Administrator privileges</h3> +<p>We consider Nextcloud administrators ultimately trusted. It is for example expected behaviour that a Nextcloud +administrator can execute arbitrary code.</p> +<p>While we're working on adding constantly more hardenings at the moment to end at some point with a solution where +administrators are not able to execute arbitrary code at the moment this is the expected behaviour.</p> + +<h3>Denial of Service</h3> +<p>Due to the usage of the PHP scripting language we do consider Denial of Service not something that can at the moment be +completely prevented. See also the article "<a href="http://lukasmartinelli.ch/web/2014/11/17/php-dos-attack-revisited.html">PHP Denial of Service Attack Revisited</a>".</p> +<p>For this reason while we do fix and acknowledge specific Denial of Service attacks we do generally not consider DoS a bounty-worthy +vulnerability.</p> + +<h3>Local external storages are considered trusted</h3> +<p>We do consider local mounted storages as trusted, so if a symlink or something else is configured on the external storage +the Nextcloud server will follow it with the web server privileges.</p> +<p>For this reason we do recommend administrators to only use the external storage mount for ultimately trusted content.</p> + +<h3>Encryption</h3> +<p>Nextcloud can be configured to encrypt data at rest. In this scenario we do prevent against storage administrators mainly, +a Nextcloud administrator could still intercept the user password to manually decrypt the encryption key. We do thus only +consider attack scenarios bounty-worthy if they include external parties.</p> + +<h3>Features intentionally marked as insecure</h3> +<p>Some features in Nextcloud are intentionally marked as insecure and disabled by default (plus have a big warning above them), +one example including preview providers such as the LibreOffice preview provider. We do at the moment consider vulnerabilities +in those features as not bounty-worthy.</p> + +<h3>Audit logging</h3> +<p>The audit logging feature in Nextcloud is at the moment missing some logs for stuff like "Accessing previews of files", +these will be added in a future release and known issues are tracked in our <a href="https://github.com/nextcloud/server/issues/">issue tracker</a>.</p> + +<h3>Attacks involving other Android apps on the device</h3> +<p>We do consider attacks involving other Android apps on the device as minimal risk, also especially considering that the +Nextcloud Android apps stores synced files locally accessible on the device. (since no Content Provider is yet implemented)</p> + +<h3>Content spoofing</h3> +<p>In many cases we consider content spoofing not a bonty-worthy vulnerability.</p> |