Go to file
Felix Prahl-Kamps abe0fb7cb5 Merge branch 'check-user-roles' into illegal-state-during-connection 2019-07-22 14:43:31 +02:00
.idea improve exchange activity layout and functionality 2019-07-14 19:17:32 +02:00
app Merge branch 'check-user-roles' into illegal-state-during-connection 2019-07-22 14:43:31 +02:00
gradle/wrapper initial commit 2019-05-27 16:06:07 +02:00
poster
screenshots improve readme 2019-07-15 18:01:42 +02:00
.gitignore .gitignore fix 2019-05-27 16:19:37 +02:00
README.md readme spelling 2019-07-17 12:43:24 +02:00
_config.yml Set theme jekyll-theme-minimal 2019-07-05 00:04:48 +02:00
build.gradle add new exchange activity 2019-07-11 16:22:58 +02:00
gradle.properties done convert to androidx 2019-06-17 09:49:09 +02:00
gradlew .gitignore fix 2019-05-27 16:19:37 +02:00
gradlew.bat .gitignore fix 2019-05-27 16:19:37 +02:00
settings.gradle

README.md

MISPbump

Simple and secure synchronisation of MISP instances

What is MISPbump?

With MISPbump admins can easily synchronize MISP instances by exchanging relevant information via encrypted QR codes.

Note: only use case 1 from the documentation is supported.

How does MISPbump work?

First of all: MISP admins login by providing the base URL of their instance and their authkey (automationkey).

On a successfull login the admins profile and the linked organisation information will be downloaded automatically.
This information can be updated at any time in the profile screen.

In the main screen you can start a synchronisation process by pressing the dedicated button.

The synchronisation process consists of 3 steps:

  1. Key Exchange
    To provide a secure chanel for data exchange, the first step is to generate a shared secret with DiffieHellman key exchange (Elliptic Curve).

    Public keys are exchanged via QR code.

  2. Synchronisation Information Exchange
    Contains the following information:

    • Own Organisation: Name, UUID, description, nationality, sector, type and contacts
    • Own User: Email
    • Own MISP instance: base URL
    • Generated: sync user authkey, sync user password
      (your partner will create a sync user with these credentials)

    The synchronisation information is encrypted with AES using the shared secret (from step 1).

    The sync process information will be saved securely on the device, that means the upload can be started any time in the future.

  3. Upload information to own MISP instance
    Uploading the information to the MISP instance is accomplished with MISP's REST API.

    Uploading consists of the following steps:

    1. Create organisation
    2. Create sync user & add to organisation
    3. Create sync server & populate with information above

After that the two MISP instances are connected.

Dependencies