-
Notifications
You must be signed in to change notification settings - Fork 0
security_opensource_best_practice
GitHub Actions edited this page Jan 2, 2026
·
1 revision
Stand: 5. Dezember 2025
Version: 1.0.0
Kategorie: Security
ThemisDB ist ein Open-Source-Projekt ohne Kundenstamm.
Daher:
- ❌ KEINE Manifest-Verschlüsselung
- ✅ Fokus auf Signatur-basierte Integrität und Authentizität
- ✅ Transparenz über Security through Obscurity
// manifest.json - Öffentlich auf GitHub
{
"version": "1.2.0",
"tag_name": "v1.2.0",
"release_date": "2025-01-20T10:00:00Z",
"is_critical": true,
"release_notes": "Security fixes...",
"files": [
{
"path": "bin/themis_server",
"sha256": "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855",
"size_bytes": 1024000,
"download_url": "https://github.com/makr-code/ThemisDB/releases/download/v1.2.0/themis_server"
}
],
"signature": {
"algorithm": "CMS-SHA256",
"signature": "...",
"certificate": "...",
"timestamp": "2025-01-20T10:00:00Z"
}
}Jede Datei im Manifest hat:
- SHA-256 Hash
- Größe in Bytes
- Download-URL
- TLS 1.3 für alle Downloads
- GitHub's CDN-Infrastruktur
# 1. Manifest generieren
./tools/generate_manifest.sh \
--version 1.2.0 \
--release-dir ./build/release \
--output manifest.json
# 2. Signieren
openssl cms -sign \
-in manifest.json \
-signer release-cert.pem \
-inkey release-key.pem \
-binary \
-outform DER \
-out manifest.json.sig
# 3. Upload zu GitHub
gh release upload v1.2.0 \
manifest.json \
themis_server \
themis_core.so// 1. Download Manifest
std::string manifest_json = downloadFromGitHub(
"https://github.com/makr-code/ThemisDB/releases/download/v1.2.0/manifest.json"
);
// 2. Parse Manifest
auto manifest = ReleaseManifest::fromJson(json::parse(manifest_json));
// 3. Verify Signature
if (!verifyManifestSignature(manifest)) {
throw SecurityException("Invalid signature");
}
// 4. Download & Verify Files
for (const auto& file : manifest.files) {
downloadFile(file.download_url);
verifyFileHash(file.path, file.sha256);
}
// 5. Apply Update
applyUpdate(manifest);- Jeder kann Manifests einsehen
- Community kann Security-Reviews machen
- Keine versteckten Komponenten
- Kein Key Management
- Keine Verschlüsselung
- Standard-Tools funktionieren
- Öffentliche Signatur-Verifikation
- Reproduzierbare Builds
- Supply Chain Security
- Entspricht Open-Source Best Practices
- Wie Kubernetes, Docker, Debian, etc.
- Industry Standard
✅ Manifest wurde von ThemisDB Team signiert ✅ Manifest wurde nicht manipuliert ✅ Dateien haben korrekte Hashes ✅ Keine Man-in-the-Middle Attacken (HTTPS)
❌ Vertraulichkeit der Manifest-Inhalte (nicht nötig, ist öffentlich) ❌ Anonymität der Downloads (GitHub Analytics)
Für ein Open-Source-Projekt wie ThemisDB:
- Signierte Manifests = ✅ Ausreichend und Best Practice
- Verschlüsselte Manifests = ❌ Unnötig und kontraproduktiv
Die bereits implementierte Lösung mit UpdateChecker + Signaturen ist perfekt!
ThemisDB v1.3.4 | GitHub | Documentation | Discussions | License
Last synced: January 02, 2026 | Commit: 6add659
Version: 1.3.0 | Stand: Dezember 2025
- Übersicht
- Home
- Dokumentations-Index
- Quick Reference
- Sachstandsbericht 2025
- Features
- Roadmap
- Ecosystem Overview
- Strategische Übersicht
- Geo/Relational Storage
- RocksDB Storage
- MVCC Design
- Transaktionen
- Time-Series
- Memory Tuning
- Chain of Thought Storage
- Query Engine & AQL
- AQL Syntax
- Explain & Profile
- Rekursive Pfadabfragen
- Temporale Graphen
- Zeitbereichs-Abfragen
- Semantischer Cache
- Hybrid Queries (Phase 1.5)
- AQL Hybrid Queries
- Hybrid Queries README
- Hybrid Query Benchmarks
- Subquery Quick Reference
- Subquery Implementation
- Content Pipeline
- Architektur-Details
- Ingestion
- JSON Ingestion Spec
- Enterprise Ingestion Interface
- Geo-Processor Design
- Image-Processor Design
- Hybrid Search Design
- Fulltext API
- Hybrid Fusion API
- Stemming
- Performance Tuning
- Migration Guide
- Future Work
- Pagination Benchmarks
- Enterprise README
- Scalability Features
- HTTP Client Pool
- Build Guide
- Implementation Status
- Final Report
- Integration Analysis
- Enterprise Strategy
- Verschlüsselungsstrategie
- Verschlüsselungsdeployment
- Spaltenverschlüsselung
- Encryption Next Steps
- Multi-Party Encryption
- Key Rotation Strategy
- Security Encryption Gap Analysis
- Audit Logging
- Audit & Retention
- Compliance Audit
- Compliance
- Extended Compliance Features
- Governance-Strategie
- Compliance-Integration
- Governance Usage
- Security/Compliance Review
- Threat Model
- Security Hardening Guide
- Security Audit Checklist
- Security Audit Report
- Security Implementation
- Development README
- Code Quality Pipeline
- Developers Guide
- Cost Models
- Todo Liste
- Tool Todo
- Core Feature Todo
- Priorities
- Implementation Status
- Roadmap
- Future Work
- Next Steps Analysis
- AQL LET Implementation
- Development Audit
- Sprint Summary (2025-11-17)
- WAL Archiving
- Search Gap Analysis
- Source Documentation Plan
- Changefeed README
- Changefeed CMake Patch
- Changefeed OpenAPI
- Changefeed OpenAPI Auth
- Changefeed SSE Examples
- Changefeed Test Harness
- Changefeed Tests
- Dokumentations-Inventar
- Documentation Summary
- Documentation TODO
- Documentation Gap Analysis
- Documentation Consolidation
- Documentation Final Status
- Documentation Phase 3
- Documentation Cleanup Validation
- API
- Authentication
- Cache
- CDC
- Content
- Geo
- Governance
- Index
- LLM
- Query
- Security
- Server
- Storage
- Time Series
- Transaction
- Utils
Vollständige Dokumentation: https://makr-code.github.io/ThemisDB/