-
Notifications
You must be signed in to change notification settings - Fork 4.5k
snapshots security may need to be improved #7167
Comments
@sakridge I've started looking into this. Additional findings so far (might be wrong; so reviews are welcome!):
|
Yea. These seem like good issues, essentially we should try to detect a zip bomb and not unzip it if it is. The data zero-ing one is maybe lower priority, but probably a good idea since it is probably inexpensive. |
Another ones:
(Once, I've finished searching remaining problems, I'll triage them and create a compiled list) |
Moar:
|
Do you mean system accounts? Those should come from the validator software itself, but we should definitely check that they cannot be shielded by a snapshot version. We should add the executable and rent_epoch there as well. |
|
|
@TristanDebrunner do you have 👀 on this? |
Yep, thanks @t-nelson! |
To elaborate on this a bit, even if a validator knows priori a set of trusted validators, currently the validator is forced to do the full round of un- In other words, unless snapshot itself is signed, validators are exposed the wasted computing resource, potential vulnerabilities in the snapshot sanitization (which we'll try very hard to get done right), wasted lamports for extra TXes and general DOS attack when restarting. To sign a snapshot, accompany it with a |
Also, this is also affected as one of API endpoints by #5778. I dunno current behavior for our HTTP server code for classic slow/stale malicious clients and too many concurrent requests etc. I'm pretty sure there are many doable common attack. For the particularity of snapshots, it's also worth nothing that any stale clients may make validator hold indefinitely old file descriptors for Also, because snapshot archive files tend to be large, it's quite easy overwhelm the validator's outgoing bandwidth with just |
|
|
|
|
|
https://github.com/solana-labs/solana/pull/9219/files#r403398028
|
|
|
Problem
snapshots are untrusted data, but the snapshot ingestion is not secure in a few ways.
Proposed Solution
Audit snapshot ingestion path for security issues:
Towards #6727, related to #6936
The text was updated successfully, but these errors were encountered: