TLS verification is the kind of issue that should never have existed, it completely subverted the entire security model built up underneath it - nevertheless I spent sometime after it thinking about more nuanced security models for litewallets -https://forum.zcashcommunity.com/t/practical-privacy-issues-in-lite-clients/36132/6?u=sarahjamielewis …
-
-
Replying to @SarahJamieLewis @alchemyDC and
The entire point of my conclusion was that there are very real & practical privacy issues in apps where zcash is used that need consideration and that aren't being given consideration while these apps are also being promoted widely (and the security patched versions less so)
2 replies 0 retweets 4 likes -
Replying to @SarahJamieLewis @alchemyDC and
I stand by my conclusion. There is a very real need for the development of robust threat models for ecosystem software and the resources on the development side to incorporate those into design and testing.
2 replies 0 retweets 4 likes -
Agreed. There are some difficult trade-offs between security and performance/usability that need to be navigated by shielded light clients. I believe that users with "life and limb" threat models should use full nodes and appropriate layered network privacy solutions.
1 reply 0 retweets 1 like -
That is completely besides the main point, the other cryptographic vulnerability referenced in the first tweet was in the full node version of zecwallet. We're not talking about trade-offs here, we're talking about fundamental (lack of) secure design practice.
1 reply 0 retweets 2 likes -
It's my understanding that the disabled TLS verification issue was quickly corrected after disclosure. I agree that was a rookie mistake. What is the other cryptographic vulnerability that you're referring to? I can't find a link to it in your original tweet.
1 reply 0 retweets 0 likes -
You keep saying "when it was discovered it was quickly fixed" as if it is relevant to a risk model analysis of the product. It's not. The other cryptographic issue was a reply attack in the wormhole code:https://github.com/ZcashFoundation/zecwallet/issues/243 …
1 reply 0 retweets 2 likes -
Replying to @SarahJamieLewis @alchemyDC and
I wanted to respond since
@trailofbits was mentioned: We rapidly reviewed ZecWallet over 1 week in Apr 2019 and found a record 26 bugs; a substantial number for a short project that implies more bugs exist. Security review is not a guarantee of safety. https://github.com/trailofbits/publications/blob/master/reviews/zecwallet.pdf …1 reply 3 retweets 15 likes -
Replying to @dguido @SarahJamieLewis and
Fix reviews were not scoped in the project at the time, however, we re-reviewed the project over the last 2 days and found the majority of our findings remain unaddressed, including all but 1 of our TLS-relevant findings. That’s easy to see: https://www.ssllabs.com/ssltest/analyze.html?d=wormhole.zecqtwallet.com&hideResults=on&latest …
1 reply 0 retweets 5 likes -
Replying to @dguido @SarahJamieLewis and
Security reviews represent a point in time. We noted the inability to adequately test ZecWallet would lead to issues in our report, and it did. The broken TLS validation and nonce-reuse issues that Sarah discovered were added after our review concluded.https://github.com/ZcashFoundation/zecwallet/issues/243 …
1 reply 0 retweets 5 likes
Advice for project stakeholders: - Insist on fix reviews by security experts - Address long-term SDL issues, as noted in our reports - Recognize the limitations of point-in-time reviews - Consider threat models for important projects
-
-
Replying to @dguido @SarahJamieLewis and
I appreciate the follow up Dan, and agree with your go-forward recommendations.
0 replies 0 retweets 1 likeThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.