[tahoe-lafs-trac-stream] [tahoe-lafs] #2142: How to enhance WebUI default security against capability eavesdropping?

tahoe-lafs trac at tahoe-lafs.org
Thu Dec 26 23:45:09 UTC 2013


#2142: How to enhance WebUI default security against capability eavesdropping?
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  amontero
  amontero               |     Status:  new
         Type:           |  Milestone:  undecided
  enhancement            |    Version:  1.10.0
     Priority:  normal   |   Keywords:  websec confidentiality privacy wui
    Component:  code-    |  webapi docs
  frontend-web           |
   Resolution:           |
Launchpad Bug:           |
-------------------------+-------------------------------------------------

Comment (by daira):

 Replying to [comment:7 amontero]:
 > Replying to [comment:5 zooko]:
 > > So, do the docs referenced in comment:4 answer your questions,
 amontero? If so, then I guess the next-step is to arrange things so that
 the next user finds the necessary docs.
 >
 > I was aware of the SSL enabling syntax for [node].web.port setting, it's
 nicely documented as it is now. What I would like to know is if the
 already present "node.pem" file can be used as a webport SSL certificate
 (I didn't succeeded at it).

 I don't know whether that can be made to work but it's probably not a good
 idea, anyway. Use a separate private key generated by openssl:
 {{{
 openssl genrsa -out mykey.pem 4096
 openssl rsa -pubout -in mykey.pem -out publickey.pem
 }}}
 (and then get a certificate on {{{publickey.pem}}}), or, for a self-signed
 cert with 100-year validity:
 {{{
 openssl req -x509 -newkey rsa:4096 -keyout mykey.pem -out cert.pem -days
 36526
 }}}

-- 
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/2142#comment:8>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list