[wp-trac] [WordPress Trac] #39309: Secure WordPress Against Infrastructure Attacks

WordPress Trac noreply at wordpress.org
Thu Apr 22 05:12:16 UTC 2021


#39309: Secure WordPress Against Infrastructure Attacks
------------------------------------------+-----------------------------
 Reporter:  paragoninitiativeenterprises  |       Owner:  (none)
     Type:  task (blessed)                |      Status:  assigned
 Priority:  normal                        |   Milestone:  Future Release
Component:  Upgrade/Install               |     Version:  4.8
 Severity:  critical                      |  Resolution:
 Keywords:  has-patch                     |     Focuses:
------------------------------------------+-----------------------------

Comment (by heriya4199):

 Replying to [ticket:39309 paragoninitiativeenterprises]:
 > (Similar to #25052 but much more focused on the implementation details)
 >
 > == Background ==
 >
 > Recommended reading:
 >
 > 1. http://seclists.org/oss-sec/2016/q4/478
 > 2. https://www.wordfence.com/blog/2016/11/hacking-27-web-via-wordpress-
 auto-update/
 > 3. https://paragonie.com/blog/2016/10/guide-automatic-security-updates-
 for-php-developers
 >
 > Currently, if an attacker can compromise api.wordpress.org, they can
 issue a fake WordPress update and gain access to every WordPress install
 on the Internet that has automatic updating enabled. We're two minutes to
 midnight here (we were one minute to midnight before the Wordfence team
 found that vulnerability).
 >
 > Given WordPress's ubiquity, an attacker with control of 27% of websites
 on the Internet is a grave threat to the security of the rest of the
 Internet. I don't know how much infrastructure could withstand that level
 of DDoS. (Maybe Google?)
 >
 > The solution is to make the automatic update mechanism secure **even if
 the update server is totally owned up**. As published in the third link,
 the core elements of a totally secure automatic update system are:
 >
 > 1. Offline Cryptographic Signatures
 > 2. Reproducible Builds
 > 3. Decentralized Authenticity / Userbase Consistency Verification
 > 4. Transport-Layer Security
 > 5. Mirrors and Other Availability Concerns
 > 6. Separation of Privileges
 >
 > However, I'm mostly interested in 1, 2, and 3. I believe 4 is already
 implemented (if not, this just became a lot scarier).
 >
 > == Proposed Solution ==
 >
 > We're going to have to roll this out in phases, rather than all at once.
 >
 > 1. Offline Cryptographic Signatures
 >   1. Decide on a digital signature algorithm and/or cryptography library
 to use.
 >   2. Generate a keypair for the release managers to use.
 >   3. Pin the public key in a major release (e.g. 4.8 or 4.9).
 >   4. Add signature verification to the update process, but for the first
 release or two, **don't enforce it**. Just collect data until we're sure
 it works for everyone.
 >   5. Enforce digital signatures. Then this is satisfied.
 > 2. Reproducible Builds.
 >   1. The update file should be easily reproduced by any end user.
 >   2. The update file and update served by api.wordpress.org should be
 easily verifiable.
 >   3. We wrote Pharaoh for auditing PHP Archives; something similar may
 be useful for WP updates: https://paragonie.com/project/pharaoh
 > 3. Decentralized Authenticity / Userbase Consistency Verification
 >   * See below.
 > 4. Make plugin/theme updates secure.
 >
 > Once core updates are secure, the next step is to allow plugin/theme
 developers to upload their own public keys which can be used to sign their
 own extensions.
 >
 > If you want a reference implementation, we already have a working secure
 automatic update system built into CMS Airship (which is GPL 3):
 >
 > * https://paragonie.com/blog/2016/05/keyggdrasil-continuum-cryptography-
 powering-cms-airship
 > *
 https://github.com/paragonie/airship/blob/master/src/Engine/Continuum.php
 > *
 https://github.com/paragonie/airship/blob/master/src/Engine/Keyggdrasil.php
 >
 > === Decentralized Authenticity ===
 >
 > In CMS Airship, we're totally decentralized: Every Airship maintains its
 own record of every update file or new/revoked public key since its
 inception. (This is because CMS Airship aims for maximum security.)
 >
 > For WordPress, I'm recommending a federated model instead, but the
 concepts are mostly the same:
 >
 > 1. Notaries (WordPress blogs or other services that opt in to
 hosting/verifying the updates) will mirror a Merkle tree which contains
 (with timestamps and signatures):
 >   * Any new public keys
 >   * Any public key revocations
 >   * Cryptographic hashes of any core/extension updates
 > 2. WordPress blogs will have a pool of notaries they trust explicitly.
 (This can be provided by your hosting provider, who runs the single source
 of truth for all their clients, so long as they themselves practice due
 diligence.)
 > 3. When an update is received from the server, after checking the
 signature against the WP core's public key, they will poll at least one
 trusted Notary (send a challenge nonce, current timestamp, a checksum of
 the update file, and any other useful identifying metadata e.g. "wp-core
 version 4.9.2"). The Notary will verify that the update exists and matches
 the checksum on file, and respond with a signed message containing:
 >   * The challenge nonce
 >   * The response timestamp
 >   * Whether or not the update was valid
 >
 > This will be useful in the event that the WP.org's signing key is ever
 compromised by a sophisticated adversary: If they attempt to issue a
 silent, targeted update to a machine of interest, they cannot do so
 reliably: To pull off their attack, they have to allow the Merkle tree
 (that is mirrored by every Notary) to record/broadcast evidence of their
 attack in order for it to succeed. So while targeted attacks may still be
 theoretically possible, it will no longer be possible to do them silently.
 >
 > In addition to a security layer, it's a deterrent against the most
 sophisticated threats.
 >
 > === Securing Plugins and Themes ===
 >
 > This will probably be the last piece tackled. Basically: Offer the same
 signing capabilities to theme/plugin developers that will already be in
 the hands of the core team.
 >
 > This can be done piecemeal (i.e. optional field on WP.org that allows
 them to upload their public key, generated by some tooling we provide
 developers). We should incentivize packages that provide their own
 signature by, for instance, placing them higher in the listings and/or
 giving them an attractive and desirable UI element that says "we're
 secure".
 >
 > If we one day reach near-100% coverage of the WP ecosystem with digital
 signing, we can discuss making it mandatory.
 >
 > == Implementation Recommendations ==
 >
 > Okay, this section is going to be technical so feel free to skip most of
 this if you're not into cryptography.
 >
 > TL;DR - We need a libsodium polyfill, which Paragon Initiative
 Enterprises is willing to write for free if (and only if) the cost of an
 independent third party audit is covered by the community and/or the
 community's corporate sponsors.
 >
 > === Digital signatures ===
 >
 > PHP, out of the box, only supports RSA signatures (via the OpenSSL
 extension), but doesn't support RSASSA-PSS+MGF1SHA256. PKCS1v1.5 padding
 is unacceptable.
 >
 > It may be tempting to move towards something like ECDSA, but a mix of
 security concerns (the Sony ECDSA k-value reuse incident, invalid curve
 attacks against Weierstrass curves) makes us wary even of RFC 6979
 (deterministic ECDSA).
 >
 > We propose a standardized digital signature algorithm based on twisted
 Edwards curves. Namely, **Ed25519** or **Ed448** (EdDSA over the RFC 7748
 curves).
 >
 > === Merkle Trees ===
 >
 > The TrimmedMerkleTree in Halite is probably the best starting point:
 https://github.com/paragonie/halite/blob/master/src/Structure/TrimmedMerkleTree.php
 >
 > Halite's Merkle tree implementations are based on the BLAKE2b hash
 function (a SHA3 finalist with great performance in software based on the
 ChaCha20 round function).
 >
 > === Checksums ===
 >
 > One of the following algorithms should be used where ever a checksum is
 required:
 >
 > * BLAKE2b
 > * SHA-512/256
 > * SHA-512/224
 > * SHA-384
 >
 > At no point should MD5 or SHA1 be considered. SHA-256 and SHA-512 are
 vulnerable to length-extension attacks and are not recommended.
 >
 > == Action Plan ==
 >
 > First, if this plan is agreeable by WordPress's security team, we'll get
 to work on a libsodium polyfill that works as far back as PHP 5.2.4 (in
 the spirit of WordPress's backwards compatibility tradition).
 >
 > Once that's finished, independently audited by cryptography experts, and
 released to the public, we'll work on getting the core cryptographically
 signed. This will require some additional tooling; the release managers
 will need to run a command to produce a valid signature of the update file
 before releasing it.
 >
 > After core updates are signed and signatures are being verified, we'll
 build the decentralized verification layer.
 >
 > Then, we can move forward with making everyone's plugins and extensions
 securely delivered.
 >
 > ---
 >
 > Edit Jan 3, 2019: As noted in [comment:50 comment #50], adding the
 sodium_compat library has been split out to a separate ticket, #45806, as
 it can serve a wider purpose than protecting against infrastructure
 attacks. -- @peterwilsoncc

-- 
Ticket URL: <https://core.trac.wordpress.org/ticket/39309#comment:110>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform


More information about the wp-trac mailing list