Skip to content
This repository was archived by the owner on Apr 13, 2025. It is now read-only.

Commit 1fc9009

Browse files
hlxidTimTechDev
andauthored
Add doc entry about security considerations of nodecg-io (#143)
* Add doc entry about security considerations of nodecg-io * Add note about baselayer security and encryption options to security considerations * Mention in the security considerations that other dashboards can access the plaintext password * Apply grammar suggestions from TimTechDev Co-authored-by: Tim <[email protected]> --------- Co-authored-by: Tim <[email protected]>
1 parent 7bf5f0a commit 1fc9009

File tree

3 files changed

+54
-7
lines changed

3 files changed

+54
-7
lines changed
Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
# Security considerations
2+
3+
nodecg-io is managing all configuration values for your service instances which consists of authentication credentials for third party services.
4+
nodecg-io tries to protect this sensitive data but can't make it completely safe due to constraints in the NodeCG architecture.
5+
6+
This document will explain what nodecg-io can and can't do to protect your sensitive configuration data including credentials.
7+
The first part consist of our security claims and the second part describes how achieve those claims.
8+
9+
## Security claims
10+
11+
These claims all assume that you use a good strong password and take care of it properly.
12+
Also, a secure base layer is assumed here. Security Bugs in node.js/V8, your browser or your operating system are possible and can compromise your private data in nodecg-io. Possible malware or e.g. keyloggers on your computer may also compromise this security model.
13+
14+
1. No service configuration is accessible to someone with only filesystem access.
15+
16+
- An exception to this is a nodecg-io install with automatic login as the password is stored in plain text.
17+
18+
2. All loaded bundles may be able to access your plain text password if they have a dashboard.
19+
3. All loaded bundles may change nodecg-io settings like deleting instances
20+
4. All loaded bundles may access all your configurations and passwords.
21+
22+
- It is highly recommended to only use bundles you trust!
23+
24+
5. Anyone intercepting network traffic between the NodeCG instance and browser with a logged in dashboard can access all configuration and passwords.
25+
26+
- It is highly recommended configuring NodeCG to use HTTPS when using untrusted networks (e.g. the internet, open Wi-Fi if your NodeCG port is not firewalled)
27+
28+
TL;DR don't use untrusted bundles and use HTTPS if your NodeCG run inside an untrusted network.
29+
30+
## Implementation
31+
32+
1. The configuration is stored encrypted only in a NodeCG replicant. If someone reads the persistent value of the replicant from the filesystem the configuration cannot be read because it is encrypted using your chosen password.
33+
34+
- AES Options:
35+
- Bit length: 256 bits
36+
- AES block cipher mode: CBC
37+
- Padding scheme: PKCS7
38+
39+
2. When you enter your password inside the dashboard, it is used to derive an encryption key using argon2id. Only this encryption key is ever transmitted and leaves the browser tab. Therefore, other bundles can listen to the communication, but it only contains the derived encryption key, not your plain text password. However, bundles with a dashboard are inside the same browser tab as the nodecg-io dashboard and can therefore access all elements of the nodecg-io dashboard using the DOM and including your plain text password.
40+
41+
- Argon2id options:
42+
- Memory size: 37 MiB
43+
- Iteration count: 2
44+
- Parallelism: 1
45+
46+
3. Bundles can listen to the login message from the dashboard to get the encryption key. This can be used to send authenticate messages to the nodecg-io-core bundle to add/delete instances, change service instance assignments and do everything that is possible in the dashboard.
47+
4. As mentioned in 3 all bundles can get the encryption key. The encrypted configuration is stored in a replicant which can be accessed by all bundles as well. Using these two any bundle could decrypt the configuration and have access to it.
48+
5. Same as in 3, everyone who intercepts network traffic will be able to intercept the encryption key that gets sent to the core using NodeCG messages.

docs/getting_started/use_replicants.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ TODO: explain for what replicants are useful
99

1010
Current list of services with replicant support:
1111

12-
- StreamElements
12+
- StreamElements
1313

1414
(more services with replicants will hopefully be added in the future)
1515

@@ -56,11 +56,11 @@ Here's an example for the StreamElements service (replace the name with the serv
5656

5757
...
5858

59-
streamElements?.onAvailable((client) => {
59+
streamElements?.onAvailable((client) => {
6060
...
61-
// Connect your replicant to this nodecg-io service instance.
62-
client.setupReplicant(streamElementsReplicant);
63-
});
61+
// Connect your replicant to this nodecg-io service instance.
62+
client.setupReplicant(streamElementsReplicant);
63+
});
6464
}
6565

6666
```
@@ -72,5 +72,3 @@ In case you want to use the created replicant in your bundles extension you alre
7272
You can access the NodeCG replicant as usual. Use `replicant.value` to get the current state and `replicant.on("change", (newValue, oldValue) => { /* .... */ })` to be informed when the value of the replicant changes.
7373

7474
To figure out what properties are available on the object value you can either look at the corresponding sample bundle or use autocomplete in your editor if you're using TypeScript.
75-
76-

mkdocs.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ nav:
4545
- Migrating an existing bundle: getting_started/existing_bundle.md
4646
- Use service replicants: getting_started/use_replicants.md
4747
- Configuration: getting_started/configuration.md
48+
- Security considerations: getting_started/security_considerations.md
4849
- Contribute:
4950
- Basics: contribute/contribute.md
5051
- Create a Service: contribute/create_service.md

0 commit comments

Comments
 (0)