mirror of
https://github.com/tayloraswift/swift-unidoc.git
synced 2026-04-03 00:09:10 -06:00
develop strategy for close-sourcing sensitive server components #245
Labels
No labels
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
bug
documentation
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
enhancement
snippets
snippets
symbol graphs
symbol graphs
symbol graphs
ui
ui
ui
voting
voting
vulnerability
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github/swift-unidoc#245
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @tayloraswift on 3/25/2024
for background, we know that somebody spent a lot of effort trying to take the Swiftinit site offline in Q4 2023, and that these attempts have continued sporadically into Q1 2024. the nature of the attacks and the endpoints they hit suggest (to me at least) that the attacker had read the source code for the server and had at least some knowledge of how the documentation service works and how to disrupt it.
we should not rely on security through obscurity, and as a project ostensibly motivated by the public interest, it would be ideal if we could continue practicing open security. however, this has proved unworkable in practice, as it slows us down considerably and prevents us from prototyping and shipping new features without extensive security auditing, as we must assume that hostile entities are watching the project and can notice new, insufficiently-secured endpoints.
close-sourcing enough of the project to keep the production site safe while still keeping enough of the project open source to provide a meaningful public benefit will require some amount of planning. we should investigate:
SwiftinitServertarget.