| <!-- |
| * weinre is available under *either* the terms of the modified BSD license *or* the |
| * MIT License (2008). See http://opensource.org/licenses/alphabetical for full text. |
| * |
| * Copyright (c) 2010, 2011 IBM Corporation |
| --> |
| |
| <p>About security for <span class="weinre">weinre</span>: <b>there is none</b>. |
| |
| <p>Obviously there should be some. The question is, what do we need to do? |
| |
| <!-- ======================================================== --> |
| <h2>Background and potential exposures</h2> |
| |
| <p>Currently <span class="weinre">weinre</span> uses plain old HTTP - not HTTPS - and provides |
| no level of authentication for requests. |
| |
| <p>The primary security exposure with <span class="weinre">weinre</span> is via |
| the debug server. |
| |
| <p>Currently, the server only reads files from the <tt>weinre.jar</tt> file, |
| and from the <tt>~/.weinre/</tt> directory (for property files). |
| The only thing the server writes to is <tt>stdout</tt> and <tt>stderr</tt>. |
| |
| <p>If you use the default <tt>--boundHost</tt> option value of |
| <tt>localhost</tt>, then any software on the machine running the debug |
| server can communicate with the debug server. This probably isn't a big |
| deal, since presumably you control the software running on that machine. |
| |
| <p>If you use a non-default <tt>--boundHost</tt> option value, |
| then <b>any software on any machine that can access that specified |
| host can communicate with the debug server</b>. This is a much bigger |
| deal. |
| |
| <p>The most obvious exposure with using <tt>--boundHost</tt> and |
| a specific hostname / ip address, is that any debug client or |
| debug target that can access that hostname / ip address can access |
| the server. For example, a rogue debug client could connect to |
| your debug target and fiddle about with it. |
| |
| <p>Other exposures include leaving a debug target injection |
| script line (ie, <tt><script src="[...]/target/target-script.js"></tt>) |
| in your web page, and then that web page connects to a rogue debug |
| server running at that address. |
| |
| <!-- ======================================================== --> |
| <h2>Future Implementation Ideas</h2> |
| |
| <ul class="spaced"> |
| |
| <li>Let's chat |
| |
| </ul> |