Skip to content

Consider shipping SecureDrop directory via HTTPS Everywhere SecureDrop update channel #3668

@redshiftzero

Description

@redshiftzero

Description

@Hainish had an interesting suggestion: to ship the SecureDrop directory in Tor Browser directly via a HTTPS everywhere SecureDrop ruleset channel.

We would:

  1. Maintain a mapping of landing pages -> onion URLs (we already do this)
  2. Create and sign a custom SecureDrop ruleset (with the SecureDrop release signing key)
  3. Get our ruleset in Tor Browser (we'd be able to update them continuously)

At that point, when sources visit the landing page of the news organization, sources would be redirected to the onion URL of the SecureDrop that is listed in the ruleset.

@Hainish, let me know if I misunderstood anything or left out an important part.

See also relevant ticket on Tor Trac. Some initial thoughts follow:

Advantages

This is a mitigation for the threat of a news organization's web server hosting the SecureDrop landing page being compromised. With this change, if the web server is compromised and the onion URL has been replaced with a malicious one, if the source is visiting the landing page using Tor, then the source will be redirected to the correct onion URL regardless.

Indeed, once landing pages are in the SecureDrop ruleset, we could have organizations update landing page text to indicate that Tor Browser will redirect them to the correct SecureDrop onion URL (else sources that visit the landing page before switching over to Tor may still go to the attacker-controlled onion URL).

Once #2951 is completed (migration to v3 onion services), sources will need to type in a significantly longer onion URL (e.g. when copying the onion URL from a newspaper/billboard/flyer/etc.). This redirect would make the experience smoother from the source perspective.

Disadvantages

In the case where a news organization wants to cycle their onion URL, they must inform us rapidly and we must be in a position to quickly update the rulesets.

There is some potential user confusion when they get redirected to a potentially-scary-looking-onion URL. Without explanation, a user may think something is wrong.

User Research

We would need to do some user testing from a non-technical user perspective to scope the UX implications of these changes.

User Stories

As a SecureDrop source, I want getting to the SecureDrop source interface to be as smooth and easy as possible.

Subtasks

  • add news organization main domain to securedrop.org directory API store URL of news organization main domain securedrop.org#675 (sprint 3/18-4/1)
  • iterate as needed on initial ruleset channel for test purposes (can start with first version at https://redshiftzero.github.io/securedrop-httpse/ using scripts at https://github.com/redshiftzero/securedrop-httpse) (sprint 3/18-4/1)
  • transition to production release key, more official URL, add alerts to regenerate/rerelease the channel upon directory changes (sprint 3/18-4/1)
  • we test on our side in Tails since Tails is a recommended tool for sources (sprint 3/18-4/1)
  • if upstream seems like they're going to make this official, we outreach to news orgs to see if there are concerns and if they want to opt-out
  • provided upstream confirms this as the officially supported onion naming system, we will support it for SecureDrop instances and transition to an officially maintained channel. In that scenario we'll have a few followup actions (more might get added here):
    • add an opt-in button for news organization to elect to have themselves added to the directory in the securedrop.org instance verification form

Metadata

Metadata

Assignees

No one assigned

    Labels

    epicMeta issue tracking child issues

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions