-
-
Notifications
You must be signed in to change notification settings - Fork 272
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Whistleblower access should be subject to an expiration time different from the data retention policy #1716
Comments
By default i will set it to 3 months and make the whistleblower reset it by simply logging onto the platform. I think that always when customized, the value of this timeout parameter should be studied and its value should take into account:
|
@NSkelsey check it out! ;) |
Security documents should be updated accordingly for what's related to anti-bruteforcing protection's references |
TODO these changes should be ported into master to satisfy the requirements of an adopter before September. |
I agree. This is now a requirement for most of the public administrations and enterprises where the data retention policy choice, in relation to some law requirements or some procedures is too broad. |
The implementation which I am porting from Browser crypto into devel, does not generate a notification to the receiver before a Whistleblower's access to the tip expires. We can modify |
This commit is cherry-picked from #9202a4b
A few notes:
More notes:
|
This commit also moves last_access onto internal_tip
I have been testing the implementation of this feature. When access is revoked the following log line is generated: 2016-07-20 21:35:12+0200 [-] Disabling WB access to cd4bd5a3-a805-4667-88cf-03fece902a12
|
Implemented in devel; will be shipped in the upcoming release. |
This commit is cherry-picked from #9202a4b
This commit also moves last_access onto internal_tip
This has still to be described in the application security policy. In addition i would suggest that the implementation reset the access expiration every time the whistleblower access. This way whistleblower that are active and log for checking their submission and possibly update it do not see their access expire; obviously in case the submission expiration time the access to the tip will expire as well with no possibilty for the whistleblower to keep it alive. |
@evilaliv3 this is what the current implementation does. |
Documented. |
Great! Well done!
|
Most of the users are doing bad use of the platform as for practical reason are always putting the data retention policy limit big near to infinite.
This is acceptable in relation to the data retention policy, but not acceptable in relation to the possiblity for an attacker to get more chance in accessing existing submissions.
This require to be handled, and the best solution is to split the whistleblower access timetolive from the data retention policy timetolive.
This ticket is to keep track of the changes needed in order to implement automatic expiration of the whistleblower access that should be subject to a timeout related to the last access of the whistleblower.
The text was updated successfully, but these errors were encountered: