-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
For Cycle 33 #1007
Comments
@Emzy, I'll ask you to approve this compreq as ops lead since the main part is ops-related, thanks. |
First of all thank you very much @ajay1706 for reporting the security issue. And doing a responsible disclosure. I have to add that it was my fault not updating Grafana on https://monitor.bisq.network/ The server has no impact on the operation of Bisq. There is no sensitive data at all on that server, all is shared openly. If there would be a responsible disclosure policy, this server would be not considered a target. Bisq should in general encourage responsible disclosures, but only for systems that are relevant and for the Bisq software itself. I can't approve this for ops, because ops has no budget for responsible disclosures. |
So You mean that who ever finds such vulns in your domain should do that for free? You only asked we will pay you according to the time you have worked on it and now you only not accepting it? I have worked my time on it ad don't want to do something for free here. I deserve a little bounty atleast |
Hi @ajay1706 ! What @Emzy is saying is that his team has no budget for this kind of disclosures, not that you won't get compensated for your responsible disclosure. So it will be a bigger discussion here and I think we should put up asap a security policy for the website under bisq/SECURITY.md. Something like Security PolicySupported VersionsTODO: Point out which versions+ will receive updates. ATM v1.8.2+
Reporting a VulnerabilityTODO: Use this section to tell people how to report a vulnerability. Tell them where to go, how often they can expect to get an update on a Anyone up for drafting something for this? |
Thanks, @Emzy. It's a good point that ops doesn't have budget for this per se. Nor does any other team, though, as this is sort of an undefined area. I've gone ahead and submitted this compensation request to the DAO anyway, with txid My argument would be that others should vote for it with the proviso that we publish something like @ripcurl suggests above that makes it clear that compensation for disclosures is subject to DAO voting like any other kind of compensation. I'm not sure about budgeting, but in this case it seems like it should be assigned to ops, since it was ops-managed infrastructure in question. |
I consider that even with no budget assigned to it or team lead approving it as usual, this compensation request has been properly reviewed by various contributors and hence I leave the status of this issue as |
I think we should define more clearly what types of security vulnerability reports we consider justified for compensation and to which amounts. The potential damage by the security vulnerability could be one factor to consider as well if it touches the core functionalities (Bisq app, trading) or just the sourrounding infrastructure which mostly does not carry any real financial risk. Another factor is to be sure that the reporter has some track record of professional security research. Otherwise we invite people running scripts to detect known vulnerabilities which are often not much relevant for Bisq (no opinion about that report as I did not look closer into it, but the contributor seems not to be a professional security researcher from his Github profile). |
I’m a professional security researcher you can check my record on linkedin
I don’t post much on github post my developer days.
https://www.linkedin.com/in/ajay-sharma-33683a10b
https://twitter.com/security_donut
Hope you got to know about whether I’m being professional in this or not
…On Wed, 2 Mar 2022 at 12:34 AM, chimp1984 ***@***.***> wrote:
I think we should define more clearly what types of security vulnerability
reports we consider justified for compensation and to which amounts. The
potential damage by the security vulnerability could be one factor to
consider as well if it touches the core functionalities (Bisq app, trading)
or just the sourrounding infrastructure which mostly does not carry any
real financial risk. Another factor is to be sure that the reporter has
some track record of professional security research. Otherwise we invite
people running scripts to detect known vulnerabilities which are often not
much relevant for Bisq (no opinion about that report as I did not look
closer into it, but the contributor seems not to be a professional security
researcher from his Github profile).
—
Reply to this email directly, view it on GitHub
<#1007 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AE6DI55MCF7FEWSVQLT3AH3U5ZS4FANCNFSM5O4OYRLA>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Thanks for the additional links. I just looked into your GH account and there has not been indications to security research but the other links confirm your background. |
yeah I hardly use GH for my security thing. |
Issuance by Team:
Total Issuance: 840.00 BSQ (equivalent to: 1050.00 USD) |
Closed as accepted. |
As planned, I'll transfer 800 BSQ (1000 USD / 1.25 BSQ-USD) to @ajay1706 later today and will post the tx id when I do. |
Summary
Contributions delivered
Contributions in progress
**Notes regarding CVE
@ajay1706 reached out to me via Twitter DM to report finding a vulnerability "in a bisq.network subdomain". This is what he wrote:
I put @ajay1706 in touch with @Emzy. They sorted it out and resolved the vulnerability with a an upgrade of Grafana.
I told @ajay1706 that this is non-critical and mostly or currently entirely unused infrastructure for us and asked him to suggest an amount of compensation for his work. I told him that as a courtesy I would include this amount in my own compensation request for Cycle 33 since he has no experience with the Bisq DAO, had already done the work, and—most importantly—because we have no published responsible disclosure policy that lets security researchers know that any compensation for their work will be subject to Bisq DAO compensation. More on that last bit in a minute.
Here is the conversation between @ajay1706 (
security_donut
on Keybase) and @Emzy regarding amount requested for compensation:So: I am including this 1000 in my compensation request as a one-time favor, and, if is accepted, I will forward the 1,000 BSQ (less fees I pay) to @ajay1706 when I receive it.
I believe we should prominently publish a responsible disclosure notice that lets researchers know their work will be subject to normal DAO compensation so we don't run into something like this again.
In any case, thanks @ajay1706 and @Emzy for getting this patched up.
The text was updated successfully, but these errors were encountered: