aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/attacksurface.md (follow)
Commit message (Collapse)AuthorAgeFilesLines
* docs: move to docs subdirectoryJason A. Donenfeld2020-11-231-47/+0
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* conf: allow administrators to add and remove configs easilyJason A. Donenfeld2020-11-221-1/+2
| | | | | | | | | | We loosen the permissions a little bit while tightening the restrictions on encrypted files. This should allow administrators to easily drop unencrypted files into Data\Configurations\ and get them encrypted and made read-only, while also allowing them to delete unwanted configurations. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* manager: allow S-1-5-32-556 users to launch a limited UIJason A. Donenfeld2020-11-221-0/+1
| | | | | | | | | | | | | | | | | I still have serious security reservations about this, both conceptually -- should users be allowed to do this stuff? -- and pratically -- there are issues with this implementation that need some examination. TODO: - Is that registry key a secure path? Should we double check it? - Are we leaking handles to the unpriv'd process from the manager? Audit this too. - IPC notifications are blocking. Should we move this to a go routine to mitigate DoS potential? - Is GOB deserialization secure? Can an NCO user crash or RCE the manager? Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* conf: move configuration to C:\Program Files\WireGuard\DataJason A. Donenfeld2020-11-161-1/+1
| | | | | | It doesn't get wiped out on Windows upgrades. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* attacksurface: update to wintun changesJason A. Donenfeld2019-09-231-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* attacksurface: mention named pipe escape hatchJason A. Donenfeld2019-09-051-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* attacksurface: update mention of prefixes and namespacesJason A. Donenfeld2019-08-311-1/+2
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* tunnel: retain SeLoadDriverPrivilegeJason A. Donenfeld2019-06-071-1/+1
| | | | | | This is a big loss. We'll need to revisit this. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* global: several helpers are now upstreamJason A. Donenfeld2019-05-271-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* ui: drop permissionsJason A. Donenfeld2019-05-151-0/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: move WTS upstreamJason A. Donenfeld2019-05-151-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: clean up token manglingJason A. Donenfeld2019-05-141-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* attacksurface: updatesJason A. Donenfeld2019-05-131-5/+4
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: use more standard naming scheme for syscallsJason A. Donenfeld2019-05-131-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: run UI with elevated tokenJason A. Donenfeld2019-05-121-6/+4
| | | | | | | There are too many attacks possible when starting this with a non-elevated token. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: run UI at high integrityJason A. Donenfeld2019-05-111-0/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: local system's token is a bit more locked down than elevatedJason A. Donenfeld2019-05-081-4/+4
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* attacksurface: update with latest infoJason A. Donenfeld2019-05-071-10/+2
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* updater: move into managerJason A. Donenfeld2019-05-061-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: set security attributes on new processJason A. Donenfeld2019-05-021-1/+3
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* version: add certificate checking for official versionsJason A. Donenfeld2019-04-301-1/+1
| | | | | | This is an easy circumventable check designed mostly for convenience. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* version: add beginnings of authenticode checkingJason A. Donenfeld2019-04-301-0/+11
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* service: use WireGuardTunnel$ prefixJason A. Donenfeld2019-04-051-1/+1
| | | | Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
* attacksurface: add descriptionsJason A. Donenfeld2019-04-021-0/+40
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>