#1192 closed defect (fixed)

warn users not to rely on PyCrypto

Reported by: zooko Owned by: davidsarah
Priority: major Milestone: 1.8.0
Component: documentation Version: 1.8β
Keywords: confidentiality reviewed Cc:
Launchpad Bug:

Description

The PyCrypto AES implementation has no defenses against timing attacks, and also it seems like nobody has examined PyCrypto carefully for safety. (Although I audited the PyCrypto RNG and it was a mess but I didn't find any real holes.) People shouldn't rely on PyCrypto for their confidentiality. The way this affects Tahoe-LAFS is that people should run the Tahoe-LAFS gateway, which contains an SFTP server, locally to where they are running their SFTP client. Add a note to this effect to the appropriate documentation, presumably source:docs/frontends/FTP-and-SFTP.txt.

Attachments (1)

doc-patch-1192.dpatch (5.3 KB) - added by francois at 2010-09-04T13:55:49Z.

Download all attachments as: .zip

Change History (8)

comment:1 Changed at 2010-09-04T13:26:42Z by francois

  • Owner changed from somebody to francois
  • Status changed from new to assigned

comment:2 Changed at 2010-09-04T13:37:45Z by francois

I propose to add the following text as a second paragraph in Configuring SFTP Access of source:docs/frontends/FTP-and-SFTP.txt.

Beware that the SFTP server should only run locally because PyCrypto
cannot currently be relied on for confidentiality purpose. The PyCrypto
AES implementation has no defenses against timing attacks, and also it
seems like nobody has examined PyCrypto carefully for safety.

Changed at 2010-09-04T13:55:49Z by francois

comment:3 Changed at 2010-09-04T13:58:26Z by francois

  • Keywords review-needed added
  • Owner changed from francois to zooko
  • Status changed from assigned to new

This patch attachment:doc-patch-1192.dpatch contains another, more detailed, explanation written by Zooko.

comment:4 Changed at 2010-09-10T19:11:38Z by zooko

  • Owner changed from zooko to davidsarah

comment:5 Changed at 2010-09-10T19:27:14Z by davidsarah

  • Keywords reviewed added; review-needed removed
  • Owner changed from davidsarah to zooko

If you can run the SFTP server (which is provided by the Tahoe-LAFS gateway) on the same host as your SFTP client then you would be safe from any problem with the SFTP connection security.

This depends on the server binding only to localhost. Change it to something like:

The SFTP server is provided by the Tahoe-LAFS gateway. If you can run it on the same host as your SFTP client, and configured to accept connections only from localhost (using ":interface=127.0.0.1" in the port option as in the examples below), then you would be safe from any problem with the SFTP connection security.

comment:6 Changed at 2010-09-10T19:32:42Z by davidsarah

  • Owner changed from zooko to davidsarah
  • Status changed from new to assigned

comment:7 Changed at 2010-09-10T20:14:01Z by david-sarah@…

  • Resolution set to fixed
  • Status changed from assigned to closed

In 7d8e17c4434c5c86:

docs/frontends/FTP-and-SFTP.txt: warn users about connecting to the FTP and SFTP servers remotely. Fixes #1192

Note: See TracTickets for help on using tickets.