File: security.rst

package info (click to toggle)
wand 0.7.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 13,812 kB
  • sloc: python: 14,250; makefile: 113
file content (93 lines) | stat: -rw-r--r-- 3,902 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
Security
========

The authors & contributors of the :mod:`Wand` module, ImageMagick library, and
all the third party image delegates make a genuine effort to release stable
code. However there is a trade off between convenience & secure environment,
and everyone makes honest mistakes. Ensure you're using the latest library
versions, and the system is up to date with security patches. If you are using
:mod:`Wand` to process images from the public, then you **must** be more
vigilant.

- Never use :mod:`Wand` directly within a HTTP service, or on any server with
  public access. A simple queue based background worker can be used.
  For example: `Celery`_, `Redis`_, or Amazon's `SQS`_, but there are many
  others.
- Update the ``policy.xml`` on the system, and reduce the resource limits to
  something reasonable to your system.

  .. code:: xml

      <policy domain="resource" name="memory" value="256MiB"/>
      <policy domain="resource" name="map" value="512MiB"/>
      <policy domain="resource" name="width" value="8KP"/>
      <policy domain="resource" name="height" value="8KP"/>
      <policy domain="resource" name="area" value="16KP"/>
      <policy domain="resource" name="disk" value="1GiB"/>
      <policy domain="resource" name="file" value="768"/>
      <policy domain="resource" name="thread" value="1"/>
      <policy domain="resource" name="throttle" value="0"/>
      <policy domain="resource" name="time" value="120"/>
      <policy domain="resource" name="list-length" value="128"/>

- Update the ``policy.xml`` on the system to restrict any formats that are
  unused, or have a history of abuse.

  .. code:: xml

      <policy domain="coder" rights="none" pattern="MVG" />
      <policy domain="coder" rights="none" pattern="EPS" />
      <policy domain="coder" rights="none" pattern="PS" />
      <policy domain="coder" rights="none" pattern="PS2" />
      <policy domain="coder" rights="none" pattern="PS3" />
      <policy domain="coder" rights="none" pattern="PDF" />
      <policy domain="coder" rights="none" pattern="XPS" />
      <policy domain="filter" rights="none" pattern="*" />
      <policy domain="delegate" rights="none" pattern="HTTPS" />
      <policy domain="delegate" rights="none" pattern="SHOW" />
      <policy domain="delegate" rights="none" pattern="WIN" />
      <policy domain="path" rights="none" pattern="@*"/>

- Check the "`magick bytes`_" of all untrusted files before processing. Never
  assume that the file extension suffix, or mimetype is good enough.
  For example::

    def assert_png(filename):
        """Ensure the file at a give path has the PNG magick-number
        header.  Throw an `AssertionError` if it does not match.
        """
        PNG_HEADER = [
            0x89, 0x50, 0x4E, 0x47,
            0x0D, 0x0A, 0x1A, 0x0A
        ]
        with open(filename, 'rb') as fd:
            file_header = list(fd.read(8))
        assert file_header == PNG_HEADER

    try:
        assert_png(user_file)
        with Image(filename='png:'+user_file) as img:
            # ... do work ...
    except AssertionError:
        # ... handle exception ...

- Ensure that any Python code is invoked with a low-privileged system user.
- Ensure filenames are sanitized.
- Ensure filenames are prefixed with coder protocol.

  .. code::

      with Image(filename='png:input.png') as img:
          # ... do work ...

- Ensure error handling is in place. Expect
  :class:`~wand.exceptions.PolicyError`
  exceptions if a file-format was banned, and
  :class:`~wand.exceptions.ResourceLimitError` if the system
  is unable to allocate additional memory/disk resources.
  Both can be configured by the :file:`policy.xml` listed above.

.. _Celery: http://www.celeryproject.org/
.. _Redis: https://redis.io/
.. _SQS: https://aws.amazon.com/sqs/
.. _magick bytes: https://en.wikipedia.org/wiki/Magic_number_(programming)#Format_indicators