Cybersecurity Discussion #1444
Replies: 3 comments 4 replies
-
Good to hear you have chosen Jamulus for your project. How much time do you have for this research? I would be very interested in following your project. |
Beta Was this translation helpful? Give feedback.
-
Hi! This sounds great! Thanks for considering to work on Jamulus as part of your project and thanks for asking here beforehand. I'd certainly welcome this! :)
If your tests and attacks are solely directed at your own infrastructure as you write, then this should be fully OK.
There is a rather long thread about potential security issues here: #314 From my perspective, implementation-level issues would be most interesting:
My hope is that nothing is to be found in this area, but if there is, this would be a very high priority issue to solve. There are some things where Jamulus may not match the same assumptions which people expect from other server software or platforms:
These are architectural concerns where potential solutions (e.g. TCP) are discussed, but are rather far away from being decided upon or even implemented. Would you be OK with sharing your potential findings privately first? We are still ramping up documentation in various places, including that for our security process, but I'd prefer if we had some time to develop fixes for potential issues and only publish the full vulnerability details when fixed versions are available for download. Do you have some timeline when to start and when results would be expected? Kind regards, |
Beta Was this translation helpful? Give feedback.
-
I would add, is there an opportunity to inject malware that is then distributed to the clients? |
Beta Was this translation helpful? Give feedback.
-
Hello! My name is Lucas. I am an undergraduate at Washington University in St. Louis.
I’m taking a course on cybersecurity, which has a final project where students dive deeper into a security topic of interest.
For my project, my group was hoping we could conduct our own original research on potential security vulnerabilities on Jamulus.
As a user of Jamulus myself, I’ve been able to continue rehearsals with my college a cappella group, despite the pandemic. However, I do worry about the increase of users in the past year. If any system has a security vulnerability, it is not a matter of whether someone finds it, but whether someone exploits it.
For this project, my group will search for (or confirm the lack of) security vulnerabilities Jamulus may have. We would report our findings and discuss potential fixes and/or defenses of attacks in order to prevent them from being exploited.
As pointed out by @pljones in a discussion, “Jamulus does not publish personal ("person"-related) information without user consent.” In addition, Jamulus makes no claims of trust by its anonymous nature (@gilgongo). However, we believe this project is worth doing. Jamulus, like any application, should follow fundamental principles of cybersecurity. It is my group’s wish to confirm that Jamulus follows these principles. Also, it never hurts to be careful.
Based on my own experience with Jamulus, we're currently looking into the potential of a few attacks, including but not limited to:
- XSS attacks
- UDP Spoofing (Or other Denial of Service Attacks, like resource exhaustion or reset attacks)
- Session hijacking?
A lot of our research can be done by looking at the source code. However, our research would not be complete without performing actual attacks on a server, which I am asking permission to do here. We would make our own server for this project; we would never have to perform an attack on someone else's server, nor do we ever intend to. Still, we thought it best to let you know this for full transparency.
If you have any questions about this project, or if you are aware of potential security risks that you would like us to look into, please let me know!
Beta Was this translation helpful? Give feedback.
All reactions