-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Harden untrusted genesis file consumption #7919
Comments
As guessed this will happen someday, this became a real issue now: #8427 |
Also, like this #7167 (comment), we're currently challenged to sanitize bunch of rocksdb binary files which cannot be trusted at all and can be tampered in any arbitrary way. I'll suspect rocksdb are prepared to combat off that attack surface. So, we're forced to transition to some DDL emitter for genesis instead of carrying a tiny rocksdb instance or completely outplace it. :) |
I'd like to remove (more practically just ignore rocksdb/) in genesis entirely. It's superfluous, genesis.bin is all that matters. |
Problem
Like #7167, as
HTTP/GET
-ed genesis files can not be trusted, its deserialization and handling should be hardened. At least, before genesis hash check is done.TBD
Proposed Solution
Just redo similar measured as #7167?
TBD
The text was updated successfully, but these errors were encountered: