Open core-ai-bot opened 3 years ago
Comment by MarcelGerber Friday Apr 10, 2015 at 12:02 GMT
Wasn't it meant to be a https://
URL?
cc@
peterflynn
Comment by abose Friday Apr 10, 2015 at 12:06 GMT
HTTPS is still in the works; Procuring the SSL certificates will take a bit more time. Brackets will be using HTTPS by release.
Comment by lenovouser Friday Apr 10, 2015 at 12:28 GMT
@
peterflynn@
MarcelGerber Just a quick reminder / question. With the possibility of everyone reading the source code of brackets there is probably also a big risk of someone spamming your health data server with unnecessary data and crashing it / exceeding the HDD limit for data. I don't know if you have any protection for that, but I guess not.
Comment by abose Friday Apr 10, 2015 at 13:12 GMT
There are reasonable restrictions set at the server to handle these cases. But you can share any suggestions on defending against spam/other issues you find that could be a risk to the server.
Comment by lenovouser Friday Apr 10, 2015 at 13:49 GMT
Well you could of course restrict the amount of health data / IP. Maybe also obfuscate the implementation somehow.
Comment by abose Friday Apr 10, 2015 at 14:43 GMT
yep. Also regarding obfuscating the client implementation, we didn't want to do that as code transparency is one of the primary requirements in logging user data. Any anyone could review what data is being sent and be confident that brackets is not doing something funny.
Comment by lenovouser Friday Apr 10, 2015 at 15:25 GMT
Okay, yeah I do understand that. I am thinking of a way to generate some UUID verification maybe per MAC address but that is probably way to complicated and at some point unnecessary.
Comment by peterflynn Friday Apr 10, 2015 at 18:15 GMT
Most metrics systems out there use a fairly simple protocol that could be sniffed and spoofed too. I think the main defense really has to be detecting outliers later when you're analyzing the data. It's essentially impossible to solve solely on the client side (because the problem fundamentally is that you're not able to trust the client). So let's not worry about it for now.
The only thing that seems like a simple fix is rate-limiting: if we see more than ~2 pings with the same UUID in a 24-hour period, something is wrong and we should discard the extra ones. @
abose that's something to consider but I'm not sure it's worth doing anything yet.
Comment by abose Friday Apr 10, 2015 at 18:48 GMT
Yes, we could detect any anomalies when processing the logs.Duplicate uuid's in the same day could be weeded out & if someone is determined to break that, he could always spam with random generated uuid's. If a large number of new uuid's are detected, it means someone spammed the system. And a firewall could do the security heavy lifting.
Issue by prafulVaishnav Friday Apr 10, 2015 at 06:44 GMT Originally opened as https://github.com/adobe/brackets/pull/10867
prafulVaishnav included the following code: https://github.com/adobe/brackets/pull/10867/commits