-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy new Oracle with SHA256 key to all validators #115
Comments
I updated the key itself to SHA256 @ e3258df a while back because using a SHA1 based key would theoretically have enabled us to hack validators mnenomics via Terrad and DNS exfiltration. I also fixed a CVE related to Axios @ 0745b84. But in general we have tons of things we can address when it comes to security, I wrote up this postmortem doc a while back based on SNYK scans I did on the TR repos: https://github.com/terra-rebels/postmortems/blob/main/06272022-SecOps-Review-Postmortem.md Also in general I would like to re-write apps like the oracle feeder & price server, fcd, etc to .NET core as I dont really consider NodeJS safe due to the many supply chain attack vectors waiting in NPM to make us cry and I have some legacy code from 2016 which we can use to write our own price server feeds talking directly to the CEXs which will also remove a potential MITM vector where people would possibly just buy up the firm providing the current price feeds to our oracle and tamper with the data feed once our oracle becomes "valueable" again, so all in all I think its something we should look into but its not super high priority :) |
Oracle feeder is running in mainnet, following a one-week test period with no issues, all other validators will be encouraged to update their Oracle feeder installations. |
There was a bug discovered in the Oracle feeder, which has since been resolved. The new Oracle feeder has been available for download since late April, and has been running on a mainnet validator at that time to test. We are going to continue to run this in production for another week prior to putting up a vote to mandate all validators to use the Sha256 version. |
As I look at the screenshots posted above, the pricing is not correct.
Also, has it been adjusted to use more than 1 source for SDR (the other two sources do not include SDR)?
Thank you so much for all your work on this :) |
@nghuyenthevinh2000 Would you be able to reply to @aeuser999 re: his post above. I'll reopen the issue back to in-review until we've confirmed that these items are addressed. |
Hi, it has been fixed in this, you can find proof here: #213 |
Hi @nghuyenthevinh2000 , Thank you. That does handle the pricing issue. What about the point about SDR though:
Thank you again so much for all your work on this :) |
@aeuser999 The primary purpose of this Oracle upgrade is one of security. Future enhancements, such as including additional SDR sources may be considered at a future date. The Oracle Feeder is currently intended to function exactly the same as the previous version (current for many validators), with the exception of the introduction of Sha256 encryption. |
Added a new issue for Oracle Feeder SDR which focuses specifically on that component. Anticipate scheduling network-wide upgrade for all validators a couple of weeks after parity upgrade. |
Closing outdate issues. |
Problem definition
We need to ensure that the Oracle SHA256 patch we implemented to secure the oracle-feeder is pushed to the validators
Feature specification
Additional context
.
Acceptance criteria
The text was updated successfully, but these errors were encountered: