[tahoe-dev] Tahoe and the browser security model.

zooko zooko at zooko.com
Tue Feb 19 13:54:52 PST 2008


Nathan:

Thank you very much for reviewing our security page, but at the  
moment your recommendations seem either too general or too paranoid  
to adopt as-is.  To wit:


On Feb 19, 2008, at 2:02 PM, Nathan wrote:

> One, please mention that Tahoe's design is unique compared to most web
> applications, and that carries a risk of a mismatch between browser
> security models and Tahoe's security model.
...
> I believe there's a common idea that
> the "same site origin" policy implies that a web server is responsible
> for properly screening user-contributed data to protect users from
> attacking eachother.
>
> Tahoe does not have any such screening.  Because a user can view
> content from any Tahoe gateway, and a malicious user can upload
> content from any other Tahoe gateway (on the same grid), there is an
> attack vector that is probably unexpected by browser developers.


I think that you may be right, but that this is too much of a general  
technical issue to be useful to the users who are the intended  
audience of this wiki page:

http://allmydata.org/trac/tahoe/wiki/Security

I mean, can you express this idea in a way that is more concrete  
about attacks and provides more of a "What To Do About This" answer  
to users?  I think you can, but the result wouldn't fit onto the  
Security Page.  The result would be a white paper, and if you write  
it I will be very interested in reading it.


> Two, in the description of "potential exposure of a file" via
> hyperlinks, there are more attacks through this vector (depending on
> the threat model).
...
> an example threat model which isn't addressed in the current
> known issue for hyperlinks is a user who wants their history of file
> access to be private.  An attacker can embed image links pointing to
> their own webserver, which exposes viewers who load that page.

This is, of course, the same risk that you take with viewing HTML  
files in other contexts, but I think you are right that there is an  
added risk here, which is the risk that a user of Tahoe might think  
that the Tahoe context protects him from this.  Perhaps the Security  
page ought to list this in its list of Known Issues.


> Three, because Tahoe explores this novel security situation (with
> respect to browser usage), recommend that users who are deeply
> concerned with privacy and access to their computer should either: a.
> only view data uploaded to the grid by trusted parties, and/or b. only
> use the commandline client for retrieving data.
...
> Finally, the recommendation for the security conscious may help
> adoption, by letting potential security-minded users know that they
> mustn't rely on the infamous web browser.

Ugh -- it seems to me that this is unnecessary advice for the truly  
paranoid, who already know that, and bad advice for the average, who  
get more value out of using a web browser than they lose.  How could  
we phrase this on the Security Page in a way that was useful to people?


Regards,

Zooko



More information about the tahoe-dev mailing list