Skip to content

Commit

Permalink
threat model: resource exhaustion attack in VMs that use sd-log
Browse files Browse the repository at this point in the history
  • Loading branch information
redshiftzero committed Dec 17, 2019
1 parent 348256d commit 7d5f92c
Showing 1 changed file with 3 additions and 0 deletions.
3 changes: 3 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -567,6 +567,7 @@ The *Display VM* (sd-svs-disp) is disposable, does not have network access, and
* An adversary can read the decrypted submission.
* An adversary can attempt to elevate their privileges and escape the VM.
* An adversary can attempt to communicate through a side channel to another VM or device in the *SecureDrop Workstation's* environment.
* An adversary can exhaust storage in the centralized logging VM (`sd-log`).

#### What Compromise of the *Proxy VM* (`sd-proxy`) Can Achieve

Expand All @@ -576,6 +577,7 @@ The *Display VM* (sd-svs-disp) is disposable, does not have network access, and
* Access encrypted messages and submissions.
* Access plaintext journalist passwords to the *Journalist Interface*.
* An adversary can attempt to elevate their privileges and escape the VM.
* An adversary can exhaust storage in the centralized logging VM (`sd-log`).

#### What Compromise of the *Whonix Gateway VM* (`sd-whonix`) Can Achieve

Expand All @@ -593,6 +595,7 @@ The *SVS VM* is where securedrop-client resides. It does not have network access
* An adversary can decrypt arbitrary encrypted submissions.
* An adversary can interact with the SecureDrop *Journalist Interface* or modify SecureDrop client code.
* An adversary can attempt to elevate their privileges and escape the VM.
* An adversary can exhaust storage in the centralized logging VM (`sd-log`).

#### What Compromise of the *GPG VM* (`sd-gpg`) Can Achieve

Expand Down

0 comments on commit 7d5f92c

Please sign in to comment.