[tahoe-lafs-trac-stream] [tahoe-lafs] #2018: padding to hide the size of plaintexts
tahoe-lafs
trac at tahoe-lafs.org
Sun Jul 21 07:43:38 UTC 2013
#2018: padding to hide the size of plaintexts
-------------------------+-------------------------------------------------
Reporter: zooko | Owner:
Type: | Status: new
enhancement | Milestone: undecided
Priority: normal | Version: 1.10.0
Component: code- | Keywords: confidentiality privacy compression
encoding | newcaps
Resolution: |
Launchpad Bug: |
-------------------------+-------------------------------------------------
Comment (by nejucomo):
A natural starting place for threat modeling attacker capabilities would
be the operator of a single storage node. Here's how to get started in
your career of blackmailing `LAFS` users:
1. run a storage node and use `find`, `ls`, and the like to examine the
filesystem metadata on shares. (This could give sizes, creation times,
modification times, access times.)
1. examine local share contents using any tools at your disposal. (What
can this tell an attacker about shares? Serial numbers? Signing keys?
merkle tree roots?)
1. turn up logging, and modify the storage node code to log protocol-level
requests data of interest. (This could give client IPs, more precise
timing information, range requests on shares.)
--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/2018#comment:7>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-lafs-trac-stream
mailing list