[tahoe-lafs-trac-stream] [tahoe-lafs] #723: helper: client should verify ciphertext hashes and UEB
tahoe-lafs
trac at tahoe-lafs.org
Thu Nov 28 21:46:55 UTC 2013
#723: helper: client should verify ciphertext hashes and UEB
-------------------------------+------------------------------
Reporter: warner | Owner: daira
Type: defect | Status: new
Priority: major | Milestone: soon
Component: code-encoding | Version: 1.4.1
Resolution: | Keywords: helper integrity
Launchpad Bug: |
-------------------------------+------------------------------
Changes (by daira):
* owner: davidsarah => daira
* status: assigned => new
Old description:
> Prompted by a question from David-Sarah Hopwood, I spent some time today
> reviewing the helper code, and realized that the client should be doing
> more verification of the data that the helper returns to it.
> Specifically, the client should:
>
> * locally compute the ciphertext hashes (flat and Merkle tree), in
> {{{upload.EncryptAnUploadable}}}
> * compare these against the versions returned by the helper, in
> {{{AssistedUploader._build_verifycap}}}
> {{{upload_results.uri_extension_data}}}
> * compute and compare the resulting UEB hash
>
> This would prevent the helper from causing an integrity violation. With
> the present behavior, the helper can flip bits in the ciphertext (or
> upload a completely unrelated ciphertext of the same length) and return
> the resulting ciphertext hash to the trusting client. Because the client
> doesn't perform any validation of the response, it will simply build and
> return the resulting filecap. Later, when someone attempts a download
> with this filecap, they will receive the altered ciphertext (but it will
> match the hash provided by the helper) and try to decrypt it. Since we
> removed the plaintext hashes in
> [changeset:7996131a0aa0b55c],[changeset:7b21054c33d4651d],[changeset:1e097766c9b4c873],[changeset:db566db31a66e076],
> the downloader hash no way to check the plaintext either, and will return
> corrupted plaintext to the end user.
>
> With the current codebase, this won't be too much work. But when
> [http://allmydata.org/trac/pycryptopp/ticket/18 pycryptopp#18] (allow
> random-access AES-CTR encryption) is fixed, I'd like to improve the
> assisted-uploader code to be more efficient in the resumed-upload case
> (by not encrypting-then-discarding all the previously-uploaded data), at
> which point this locally-generate-hashes fix would become more difficult.
> Or rather, I might have to forego the resumed-upload improvement to
> retain the don't-rely-on-helper-for-integrity property that this ticket
> would provide.
New description:
Prompted by a question from Daira, I spent some time today reviewing the
helper code, and realized that the client should be doing more
verification of the data that the helper returns to it. Specifically, the
client should:
* locally compute the ciphertext hashes (flat and Merkle tree), in
{{{upload.EncryptAnUploadable}}}
* compare these against the versions returned by the helper, in
{{{AssistedUploader._build_verifycap}}}
{{{upload_results.uri_extension_data}}}
* compute and compare the resulting UEB hash
This would prevent the helper from causing an integrity violation. With
the present behavior, the helper can flip bits in the ciphertext (or
upload a completely unrelated ciphertext of the same length) and return
the resulting ciphertext hash to the trusting client. Because the client
doesn't perform any validation of the response, it will simply build and
return the resulting filecap. Later, when someone attempts a download with
this filecap, they will receive the altered ciphertext (but it will match
the hash provided by the helper) and try to decrypt it. Since we removed
the plaintext hashes in
[changeset:7996131a0aa0b55c],[changeset:7b21054c33d4651d],[changeset:1e097766c9b4c873],[changeset:db566db31a66e076],
the downloader hash no way to check the plaintext either, and will return
corrupted plaintext to the end user.
With the current codebase, this won't be too much work. But when
[http://allmydata.org/trac/pycryptopp/ticket/18 pycryptopp#18] (allow
random-access AES-CTR encryption) is fixed, I'd like to improve the
assisted-uploader code to be more efficient in the resumed-upload case (by
not encrypting-then-discarding all the previously-uploaded data), at which
point this locally-generate-hashes fix would become more difficult. Or
rather, I might have to forego the resumed-upload improvement to retain
the don't-rely-on-helper-for-integrity property that this ticket would
provide.
--
--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/723#comment:6>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-lafs-trac-stream
mailing list