Skip to content

Commit c7b852b

Browse files
committed
security boundary
1 parent 878ab75 commit c7b852b

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

documentation/en/design/README.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -116,3 +116,21 @@ To address these issues in Curio, we have implemented a GPU picker library calle
116116
<figure><img src="../.gitbook/assets/2024-06-04-040735_1470x522_scrot (1).png" alt=""><figcaption><p>Curio FFISelect in action</p></figcaption></figure>
117117

118118
This approach ensures efficient and conflict-free GPU usage, with each task being handled by a dedicated GPU, thus resolving the historical issues observed with the `lotus-miner` scheduler.
119+
120+
# Security Boundary
121+
122+
This is what Curio expects an SP to secure in order to have a safe experience.
123+
Curio is cluster software which coordinates directly and through the database. It also communicates to the public through chain providers (Lotus) and the market node. To secure this properly, ensure that only trusted people & services have access to:
124+
- logs: (these include inputs to failing processes)
125+
- physical machines,
126+
- virtual machine access (ssh) for Curio, Lotus, or Yugabyte
127+
- Curio or Lotus' or Yugabyte's open ports (with exceptions noted by Lotus, and the Curio market node)
128+
-- This includes the admin web ui for Curio which exposes numerous capabilities beyond viewing.
129+
130+
Safe to share with untrusted parties: (will not receive private information)
131+
- Prometheus output
132+
- alerts can be sent to untrusted receivers
133+
- CuView (at your own risk) has modes for light investigation.
134+
135+
Curio team recommend a network (VPN) containing all the pieces to have limited access.
136+
Logs are mostly clean except for errors which try to be as specific as possible, so partial redaction may be best here if sharing with untrusted parties.

0 commit comments

Comments
 (0)