summary refs log tree commit diff
path: root/docs/server-server/security-threat-model.rst
blob: cf0430e43d46c7808d16a4488c8d8182ba950a32 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
Overview
========

Scope
-----

This document considers threats specific to the server to server federation 
synapse protocol.


Attacker
--------

It is assumed that the attacker can see and manipulate all network traffic 
between any of the servers and may be in control of one or more homeservers 
participating in the federation protocol.

Threat Model
============

Denial of Service
-----------------

The attacker could attempt to prevent delivery of messages to or from the 
victim in order to:

    * Disrupt service or marketing campaign of a commercial competitor.
    * Censor a discussion or censor a participant in a discussion.
    * Perform general vandalism.

Threat: Resource Exhaustion
~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could cause the victims server to exhaust a particular resource 
(e.g. open TCP connections, CPU, memory, disk storage)

Threat: Unrecoverable Consistency Violations
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could send messages which created an unrecoverable "split-brain"
state in the cluster such that the victim's servers could no longer dervive a
consistent view of the chatroom state.

Threat: Bad History
~~~~~~~~~~~~~~~~~~~

An attacker could convince the victim to accept invalid messages which the 
victim would then include in their view of the chatroom history. Other servers
in the chatroom would reject the invalid messages and potentially reject the
victims messages as well since they depended on the invalid messages.

Threat: Block Network Traffic
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could try to firewall traffic between the victim's server and some
or all of the other servers in the chatroom.

Threat: High Volume of Messages
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could send large volumes of messages to a chatroom with the victim
making the chatroom unusable.

Threat: Banning users without necessary authorisation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could attempt to ban a user from a chatroom with the necessary
authorisation.

Spoofing
--------

An attacker could try to send a message claiming to be from the victim without 
the victim having sent the message in order to:

    * Impersonate the victim while performing illict activity.
    * Obtain privileges of the victim.

Threat: Altering Message Contents
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could try to alter the contents of an existing message from the 
victim.

Threat: Fake Message "origin" Field
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could try to send a new message purporting to be from the victim
with a phony "origin" field.

Spamming
--------

The attacker could try to send a high volume of solicicted or unsolicted 
messages to the victim in order to:
    
    * Find victims for scams.
    * Market unwanted products.

Threat: Unsoliticted Messages
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could try to send messages to victims who do not wish to receive 
them.

Threat: Abusive Messages
~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could send abusive or threatening messages to the victim

Spying
------

The attacker could try to access message contents or metadata for messages sent
by the victim or to the victim that were not intended to reach the attacker in
order to:

    * Gain sensitive personal or commercial information.
    * Impersonate the victim using credentials contained in the messages.
      (e.g. password reset messages)
    * Discover who the victim was talking to and when.

Threat: Disclosure during Transmission
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could try to expose the message contents or metadata during 
transmission between the servers.

Threat: Disclosure to Servers Outside Chatroom
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could try to convince servers within a chatroom to send messages to
a server it controls that was not authorised to be within the chatroom.

Threat: Disclosure to Servers Within Chatroom
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

An attacker could take control of a server within a chatroom to expose message
contents or metadata for messages in that room.