-
-
Notifications
You must be signed in to change notification settings - Fork 520
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Issue: Setup keys are stored unencrypted in database table "setup_keys" #2763
Comments
Setup keys should be set to expire, or limit the number of usage. If you're using setup keys without any limits you should verify your rules are "very notrusty" |
I generally agree, but there are use cases where you need keys with longer expiration dates (docker / kubernetes deployments, etc...). On the other hand this discussing misses the point. There is no good reason, why we should keep storing them unencrypted. No matter what short expiration time you choose. |
hi @florian-obradovic, thank you for opening this issue. |
Thanks a lot! |
Merged, see PR: #2775 |
Describe the problem
The setup keys are stored unencrypted in the database (at least for sqlite3) which is very bad.
If the backend or storage (Cloud & Selfhosted) gets compromised, anyone can use the setup keys to provision new peers.
To Reproduce
sudo sqlite3 /var/lib/docker/volumes/artifacts_netbird-mgmt/_data/store.db
Adjust the path to your docker volumeselect * from setup_keys;
Expected behavior
Store the setup keys encrypted by using at least salted hashes (More infos: https://www.vaadata.com/blog/how-to-securely-store-passwords-in-database/)
Are you using NetBird Cloud?
Selfhsoted
NetBird version
0.30.2
The text was updated successfully, but these errors were encountered: