-
-
Notifications
You must be signed in to change notification settings - Fork 750
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Organize a security audit #2481
Comments
Yup, maybe when 1.2 goes beta would be a good time as crypto and multithreading changes are planned. |
How do you plan to finance it? |
Audits are quite expensive and can cover very different levels of scrutiny. Some audits just look at specification or design documents (which largely don't exist for Borg), while you are probably thinking of some folks poking the code base. Given the cost there is also the latent question whether it's worth it, or if Borg is maybe not the correct target. E.g. we use msgpack a lot, which has neither been fuzzed nor audited to the best of my knowledge. Auditing Borg but then having, say, holes in msgpack would be a lot of effort for nothing :) From my PoV it would seem to make the most sense to mainly look at two different areas: (1) Crypto code, and especially the planned changes there (2) Filesystem code. The latter will of course have issues, that's just the nature of the thing — it's just not possible to make a race-condition free backup of a live file system. In the meantime this might be an interesting read: https://borgbackup.readthedocs.io/en/latest/internals/security.html |
IMHO it's also important to check borg itself. I think some audits also cover the dependents of the projects, at least sometimes. |
I'm afraid Borg is a bit too heavy in deployment to be used effectively for ransomware 😉 |
This is an interesting read: https://guidovranken.wordpress.com/ |
And just as we're talking GitHub also announced something. The problem of course is, borg does not belong to critical infrastructure for the whole web (yet…), so make sure big companies start to use it as their backup tool… 😉 |
I added this to the helium milestone. It would be a good time now considering that helium (borg 2.0) will get new crypto, see #6463. I don't think we could afford a commercial security audit, but a putting a bounty on this would be possible for sure. |
I'm writing this on the assumption that a commercial security audit costs ~ $5k-10k. Subject to my precise financial circumstances at the time, I'd be willing to proffer an 'anchor amount' (~ $1,000) for the cost of an audit. One could then poll the userbase to see if the remaining amount could be crowdfunded. Prior to doing this, I think it would make sense to: Does anyone have a rough idea as to how many regular users there are of borg? I have to believe it's core software infrastructure for a meaningful number of people ('define meaningful', I know). It seems to me that the helium milestone would be a good juncture to get an audit. |
Hello, I would be willing to add 500€ to the audit fund. The security audit for gocryptfs was done by Defuse Security (https://defuse.ca/software-security-auditing.htm) and it seems that they have experience in auditing open source software. |
Also, I do think a good time for the audit would be before Borg 2.0.0 stable is released, as it would be very difficult to make changes to the security architecture after that point. |
@Best-HeyGman Thanks for offering your support! I agree that before borg2 stable release would be a good time. |
It would be nice if this backup tool could get a professional security audit. I don't know whether attic once got one, but nevertheless as much things changed in borg a security audit for it would also be a nice idea IMHO.
Maybe make a crowdfund campaign or so to raise the money and maybe also make borg popular… 😄
The text was updated successfully, but these errors were encountered: