Skip to content

Security: crypta-network/cryptad

docs/SECURITY.md

Security

Freenet requires different security considerations than other projects.

Any security issue that can correlate your activity with easily observable behavior of your node is critical.

This specifically means:

  • any way to crash Freenet when accessing some known content is serious.
  • if you can get Freenet or the browser opening a site from Freenet to make a request to some clearnet server depending on the content being accessed, this is serious.

More so if the security issue affects the friend-to-friend mode.

There are known unfixable attacks against opennet (Sybil attacks cannot be prevented completely, only their impact reduced).

There are no known unfixable identification-attacks against friend-to-friend mode, except if your friends' nodes attack you.

Attacks we know about are detailed on the opennet attacks and the major attacks page:

What to report as normal bugs

Best practices, hardening tips, and similar are not security issues. Please report them to our regular bugtracker: https://bugs.freenetproject.org

If you are unsure whether your issue is a security issue, please come to our IRC channel (#freenet at irc.libera.chat) and talk to an op: https://web.libera.chat/?nick=FollowingTheRabbit|?#freenet

Reporting Security Issues

Please report security issues to security@freenetproject.org encrypting to all PGP/gnupg keys from our Keyring.

Please do not file public reports of security problems that could be used to connect the pseudonyms of users with the nodes they run. If you find those, please send them to the email address above so they can be resolved and the fix released before the vulnerability gets someone in danger.

We will acknowledge a report within one week. If you do not get a reply within one week, it most likely got lost: Please send it again!

App Bundle Signing Keys

Signed local AppHost bundles use developer-supplied key material during local build and verification tasks.

  • Do not commit production private keys, keystores, or exported PKCS#8 private key material to this repository.
  • Keep local development keys outside the repo and pass them through Gradle properties or environment variables, or point at local files outside the checkout.
  • If you generate a development-only key pair for testing signed bundles, label it clearly as non-production and rotate or remove it when no longer needed.

Remote catalogs and remote bundle downloads are future work. PR-192 only establishes local signed staged bundle files and local verification hooks.

There aren’t any published security advisories