Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Organize a security audit #2481

Open
rugk opened this issue May 4, 2017 · 12 comments
Open

Organize a security audit #2481

rugk opened this issue May 4, 2017 · 12 comments
Labels
Milestone

Comments

@rugk
Copy link
Contributor

rugk commented May 4, 2017

It would be nice if this backup tool could get a professional security audit. I don't know whether attic once got one, but nevertheless as much things changed in borg a security audit for it would also be a nice idea IMHO.

Maybe make a crowdfund campaign or so to raise the money and maybe also make borg popular… 😄

@ThomasWaldmann
Copy link
Member

Yup, maybe when 1.2 goes beta would be a good time as crypto and multithreading changes are planned.

@rugk
Copy link
Contributor Author

rugk commented May 4, 2017

How do you plan to finance it?

@enkore
Copy link
Contributor

enkore commented May 5, 2017

Audits are quite expensive and can cover very different levels of scrutiny. Some audits just look at specification or design documents (which largely don't exist for Borg), while you are probably thinking of some folks poking the code base. Given the cost there is also the latent question whether it's worth it, or if Borg is maybe not the correct target. E.g. we use msgpack a lot, which has neither been fuzzed nor audited to the best of my knowledge. Auditing Borg but then having, say, holes in msgpack would be a lot of effort for nothing :)

From my PoV it would seem to make the most sense to mainly look at two different areas: (1) Crypto code, and especially the planned changes there (2) Filesystem code. The latter will of course have issues, that's just the nature of the thing — it's just not possible to make a race-condition free backup of a live file system.

In the meantime this might be an interesting read: https://borgbackup.readthedocs.io/en/latest/internals/security.html

@enkore enkore changed the title Security audit Organize a security audit May 6, 2017
@rugk
Copy link
Contributor Author

rugk commented Jul 21, 2017

IMHO it's also important to check borg itself. I think some audits also cover the dependents of the projects, at least sometimes.
Also, nowadays there are many actors sponsoring audits for FLOSS software, such as Mozilla, Google or the European Union.
If borg would be a ransomware it would likely get these audits for free, easily… 😉

@enkore
Copy link
Contributor

enkore commented Jul 21, 2017

I'm afraid Borg is a bit too heavy in deployment to be used effectively for ransomware 😉

@FabioPedretti
Copy link
Contributor

This is an interesting read: https://guidovranken.wordpress.com/
also https://guidovranken.wordpress.com/2017/07/06/which-software-should-i-audit-next/ (probably not relevant for borg, which has few C/C++ code).

@rugk
Copy link
Contributor Author

rugk commented Jul 21, 2017

And just as we're talking GitHub also announced something. The problem of course is, borg does not belong to critical infrastructure for the whole web (yet…), so make sure big companies start to use it as their backup tool… 😉

@ThomasWaldmann
Copy link
Member

ThomasWaldmann commented Apr 1, 2022

I added this to the helium milestone. It would be a good time now considering that helium (borg 2.0) will get new crypto, see #6463.

I don't think we could afford a commercial security audit, but a putting a bounty on this would be possible for sure.

@awgcooper
Copy link

awgcooper commented Sep 28, 2022

I'm writing this on the assumption that a commercial security audit costs ~ $5k-10k. Subject to my precise financial circumstances at the time, I'd be willing to proffer an 'anchor amount' (~ $1,000) for the cost of an audit. One could then poll the userbase to see if the remaining amount could be crowdfunded.

Prior to doing this, I think it would make sense to:
(i) create a broad brush scope for the audit (e.g. enkore's 5 May 2017 comment above)
(ii) reach out to one or two audit companies to get a more informed view on pricing (I don't know who they are but I presume this would be easy to find out)

Does anyone have a rough idea as to how many regular users there are of borg? I have to believe it's core software infrastructure for a meaningful number of people ('define meaningful', I know). It seems to me that the helium milestone would be a good juncture to get an audit.

@Best-HeyGman
Copy link

Best-HeyGman commented Sep 21, 2024

Hello, I would be willing to add 500€ to the audit fund.

The security audit for gocryptfs was done by Defuse Security (https://defuse.ca/software-security-auditing.htm) and it seems that they have experience in auditing open source software.
EDIT: They even write "To give back to the community, I substantially reduce my rate for published open-source software (GPL, MIT, BSD, CC0, etc.) as well as open-access research."

@Best-HeyGman
Copy link

Also, I do think a good time for the audit would be before Borg 2.0.0 stable is released, as it would be very difficult to make changes to the security architecture after that point.

@ThomasWaldmann
Copy link
Member

@Best-HeyGman Thanks for offering your support!

I agree that before borg2 stable release would be a good time.

@ThomasWaldmann ThomasWaldmann modified the milestones: 2.x, 2.0.0rc1 Oct 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

6 participants