(no title)
obnauticus | 1 year ago
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=nextcloud
A common misconception IMO is that running and owning your own infrastructure is somehow more secure. To that I lol, and I’m confident that the thousands of AWS/GCP/Azure/iCloud security engineers are all doing a more thorough job than you can. At the very very least they receive embargoed bugs which they often mitigate before the general public.
bravetraveler|1 year ago
Also, I lol at most CVEs. Butterfly farted outside, oh uh.
Take the top one: In Nextcloud Desktop Client 3.13.1 through 3.13.3 on Linux, synchronized files (between the server and client) may become world writable or world readable. This is fixed in 3.13.4.
You mean to tell me a few minor point releases imitated umask, making world-readable [and possibly added writable]? Oh no! The tragedy! Keep in mind most clients are single user systems anyway.
Judge them on their facts, there are vulns and then there are vulns. CVEs are a sign of attention on a project. No more or less.
uselpa|1 year ago
laymansterms|1 year ago
("A code injection in Nextcloud Desktop Client for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the enviroment")
MrDresden|1 year ago
But for some of us it is a bit of a hobby to run our own infrastructure. And some of it only ever runs on a private network.
I rolled my own docker setup for Nextcloud a few years ago, and couldn't be happier with the outcome. It does require me to log in and update the system and setup from time to time, but that's just a good time to drink a hot bevarage and listen to podcasts in my mind.
For anyone hosting their own instance, Nextcloud offers this scan[0] of your public facing url which might come up with something worth fixing.
[0] https://scan.nextcloud.com/
zigzag312|1 year ago
I'm not so confident about that:
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=azure
It really depends on what you self-host.
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=syncthing
"Do everything" solutions go against the principle of minimizing the attack surface.
EDIT: More is not always better in security. With more people doing more things, the statistical odds of miscommunication and misconfiguration increases.
notepad0x90|1 year ago
https://www.cvedetails.com/product/34622/Nextcloud-Nextcloud...
As well as if this reflects a systemic issue with the codebase or if it is just getting much needed attention from security researchers. More CVEs can just mean they're cleaning up after vulns really well. But at the same time, if they have critical vulns over and over again, that might indicate bad coding practices or carelessness.
n_plus_1_acc|1 year ago
obnauticus|1 year ago
Generally you use these disclosures to make directional decisions about infrastructure. The list of fixed and disclosed CVEs combined with the legacy PHP code base doesn’t really pass the security sniff test. You really wouldn’t know for sure without doing a full code audit.
ReptileMan|1 year ago
If done properly cve-s don't matter that much. You create a headscale install on a pi and the headscale port and your router's ssh (key only) are the only things visible from the outside. Take any other than a home router - aka something with support. And you are done.
hypeatei|1 year ago
I think it depends on the CVEs and where they are. If it's a software vuln that requires root or some other complex prerequisites then w/e. But, if we're talking about low level problems in either the OS or network layer (e.g. firewalls, routers) then big clouds are most likely going to have that patched and rolled out more quickly IMO.
Jnr|1 year ago
Timber-6539|1 year ago
All these cloud services are just attack surfaces with a huge target on their backs. And the security engineers slip up too [0], in the case of Microsoft it's become more of a meme now. The North Korean hackers basically own them.
[0] https://www.techspot.com/news/102573-microsoft-left-server-c...
obnauticus|1 year ago
If you aren’t being specifically targeted, then you would care about low hanging fruits discovered by something like automated scanning. Not exposing your service to the internet does solve this assuming you’re confident in the stack which provides this isolation. But managing this stack and performing risk calculus here is actually where the security horse trading happens. I think most people aren’t safer managing this themselves — arguably they’re actually worse off.
I have high standards for the confidentiality of my data. I care about things like lateral movement and the massive attack surface that isolation tech to prevent such movement has. I also won’t design monitoring and alerting, ensure a patch state, or perform code audits on Nextcloud and all the isolation tech required to secure it to a comporable level of security. Because of this, I instead reason around the cost of exploitation. I want it to be higher than what I believe Nextcloud provides and I’d rather require an attacker to use an expensive 0day to extract my data off a cloud provider like Google versus a potentially cheap one against my own infra.
izacus|1 year ago
hypeatei|1 year ago
MaxBarraclough|1 year ago
Managed services also have to accept connections from the public Internet, which on-premises solutions do not.
akdev1l|1 year ago
In theory you are correct but this is like saying keeping your money under your mattress is safer than a bank.
Yes, in theory someone can still all the money at a bank but the bank is infinitely more qualified/competent to not get robbed than you would be.
bonsai_vendetta|1 year ago
[deleted]
bpfrh|1 year ago
exe34|1 year ago
protocolture|1 year ago
Like sure, someone particularly interested in your home nextcloud instance could probably find their way in eventually.
But if you are concerned more about dropbox killing your account due to nonpayment, cloud backups getting encrypted and the master key being lost, cloud engineers snooping on your files, cloud platforms targeting ads based on your downloaded files etc etc etc it offers an alternative.
CodeCompost|1 year ago
touggourt|1 year ago
klaussilveira|1 year ago