-
Notifications
You must be signed in to change notification settings - Fork 698
Description
Description
@Hainish had an interesting suggestion: to ship the SecureDrop directory in Tor Browser directly via a HTTPS everywhere SecureDrop ruleset channel.
We would:
- Maintain a mapping of landing pages -> onion URLs (we already do this)
- Create and sign a custom SecureDrop ruleset (with the SecureDrop release signing key)
- Get our ruleset in Tor Browser (we'd be able to update them continuously)
At that point, when sources visit the landing page of the news organization, sources would be redirected to the onion URL of the SecureDrop that is listed in the ruleset.
@Hainish, let me know if I misunderstood anything or left out an important part.
See also relevant ticket on Tor Trac. Some initial thoughts follow:
Advantages
This is a mitigation for the threat of a news organization's web server hosting the SecureDrop landing page being compromised. With this change, if the web server is compromised and the onion URL has been replaced with a malicious one, if the source is visiting the landing page using Tor, then the source will be redirected to the correct onion URL regardless.
Indeed, once landing pages are in the SecureDrop ruleset, we could have organizations update landing page text to indicate that Tor Browser will redirect them to the correct SecureDrop onion URL (else sources that visit the landing page before switching over to Tor may still go to the attacker-controlled onion URL).
Once #2951 is completed (migration to v3 onion services), sources will need to type in a significantly longer onion URL (e.g. when copying the onion URL from a newspaper/billboard/flyer/etc.). This redirect would make the experience smoother from the source perspective.
Disadvantages
In the case where a news organization wants to cycle their onion URL, they must inform us rapidly and we must be in a position to quickly update the rulesets.
There is some potential user confusion when they get redirected to a potentially-scary-looking-onion URL. Without explanation, a user may think something is wrong.
User Research
We would need to do some user testing from a non-technical user perspective to scope the UX implications of these changes.
User Stories
As a SecureDrop source, I want getting to the SecureDrop source interface to be as smooth and easy as possible.
Subtasks
- add news organization main domain to securedrop.org directory API store URL of news organization main domain securedrop.org#675 (sprint 3/18-4/1)
- iterate as needed on initial ruleset channel for test purposes (can start with first version at https://redshiftzero.github.io/securedrop-httpse/ using scripts at https://github.com/redshiftzero/securedrop-httpse) (sprint 3/18-4/1)
- transition to production release key, more official URL, add alerts to regenerate/rerelease the channel upon directory changes (sprint 3/18-4/1)
- we test on our side in Tails since Tails is a recommended tool for sources (sprint 3/18-4/1)
- if upstream seems like they're going to make this official, we outreach to news orgs to see if there are concerns and if they want to opt-out
- provided upstream confirms this as the officially supported onion naming system, we will support it for SecureDrop instances and transition to an officially maintained channel. In that scenario we'll have a few followup actions (more might get added here):
- add an opt-in button for news organization to elect to have themselves added to the directory in the securedrop.org instance verification form