gridcoin-community / Gridcoin-Tasks

Gridcoin community tasks repository
https://gridcoin.us
MIT License
24 stars 5 forks source link

Research alternative authentication mechanisms for BOINC projects #110

Closed skcin closed 4 years ago

skcin commented 6 years ago

Issue by grctest Tuesday Apr 11, 2017 at 21:05 GMT Originally opened as https://github.com/Erkan-Yilmaz/Gridcoin-tasks/issues/105


The current state of password reuse within the BOINC environment due to account managers poses a massive security risk, if a BOINC user has a single project's credentials phished then they can log into their Boincstats account and all associated BOINC projects (due to boincstats using the same username/email/password combination).

If there was a more secure auth mechanism found, integration into existing projects may be difficult & compatibility with existing BOINC account managers will break.

skcin commented 6 years ago

Comment by LokiToki Wednesday Apr 12, 2017 at 06:27 GMT


It's in the responsibility of the account manager like BAM. When i add a new account the default PW is used. Why account manager don't generate a secure PW and store them like a PW manager? The biggest problem i see is that the user needs a PW for every project he or she wants to log in besides the account manager. Maybe the account manager could support a export function of the users PW database in a KeePass encrypted database file. So it would be an ease to receive the pws and import them to a local KeePass instance.

skcin commented 6 years ago

Comment by grctest Wednesday Apr 12, 2017 at 23:25 GMT


Why account manager don't generate a secure PW and store them like a PW manager? It's just the way things have been implemented, it's certainly the case for Boincstats however it's not confirmed that gridrepublic has the same security practices - that's certainly worth further investigation.

What would be great would be a stand-alone account manager, like a local Boincstats BAM! on your computer, so you'd be in charge of all your own keys.

Being able to export your passwords from boincstats would enable an attacker to gain access to your BOINC projects this way, no? But you have a good point that if they wanted to log into their BOINC project account directly this would be difficult without a SSO implemented.

skcin commented 6 years ago

Comment by LokiToki Thursday Apr 13, 2017 at 07:00 GMT


What would be great would be a stand-alone account manager, like a local Boincstats BAM! on your computer, so you'd be in charge of all your own keys.

It would be another "app" the user have to install. But what if we think a bit further. Imagine a Secure Boinc Manager which encapsulate the native BOINC Manager in a secure environment that uses the Project Manager interface from the Boinc Manager - like a virtual machine. It's open source. So instead of one App u install another app including Password Manager and multi machine remote management like boinc task. Than the dev has nearly unlimited possibilities.

But: this is not the topic of this "issue"

skcin commented 6 years ago

Comment by tomasbrod Saturday Apr 15, 2017 at 21:16 GMT


78 SRP authentication mechanism keeps your password secure even if you reuse it.

grctest commented 6 years ago

OAuth2 was proposed by several of the BOINC 2017 workshop attendees.