Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [mosquitto-dev] Security audit for Eclipse Mosquitto

Thank you for the questions, Greg. 

I embedded my thought in the email below.



From: Greg Troxel
Sent: Thursday, September 22, 2022 8:34 AM
To: terryatsnort@xxxxxxxxxxx
Cc: Roger Light; General development discussions for the mosquitto project
Subject: Re: [mosquitto-dev] Security audit for Eclipse Mosquitto


<terryatsnort@xxxxxxxxxxx> writes:

> Based on other reports from OSTIF, I believe that they perform the following tasks for a general project:
>
>   *   source code review
>      *   Statice code analyzer is used
>   *   Build process review
>   *   installation
>      *   checking documents and default configuration
>   *   Threat modeling
>   *   pen testing

Sounds entirely reasonable.

> With my very limited understanding of Mosquitto, it might be useful to ask OSTIF for the following items at this stage:
>
>   1.  manual source code review
>   2.  Threat modeling
>      *   certificate/private key management on Windows platform

Why do you specifically mention Windows?  This is an open source project
and I'd therefore expect that if anything, work would lean to open
source operating systems (GNU/Linux, *BSD, illumos).  But also, I'd
expect most serious deployments to be on POSIXy systems -- but then I am
often surprised....
[Terry] Two reasons:
  1. Mosquitto is used on Windows
  2. On those open source OS, file permissions is the normal and the "only needed" way to protect the sensitive information, like private key file.
    While on Windows, certificate is normally managed by Windows Certificate store, instead of having private key as a disk file (like what's done on open source OS). Hence it's more vulnerable when being used on Windows

>   3.  Installation documents and default configuration
>   4.  Pen testing
>   5.  Dependency of OpenSSL
> How could we minimize the need to follow up the frequent update from OpenSSL

Do you mean the every few years need to change the code to keep up with
API changes?
Or are you thinking of mosquitto as producing binary releases, but
somehow statically linking OpenSSL, and therefore a perceived need to
regenerate them everytime there is a patch-level OpenSSL release?
[Terry] this is exactly what I thought. E.g., these days, a customer using a product would often scan the application by themselves, then they would like to know what to do when a new OpenSSL CVE is reported publicly:
  • is this OpenSSL CVE applicable to this application (here, the Mosquitto)?
    This might be the hardest because they don't know exactly which functionalities are used and how (without studying the source code)
  • if it's applicable, do I need to get a new version?
  • or is it necessary for me to compile the code with the latest OpenSSL?
Hope this makes sense.

Or do you mean something else?

Back to the top