Issue B: SHA256 of Plaintext File is Saved when Encryption is Enabled #822
Comments
|
the feature is not so useful for the wb that is not able to verify it clientside. |
|
i've removed the sha256 form receivers and whistleblowers API (rtip and wbtip respectively) and from the Etag header for files download in order to address a short term remediation. we decided to not remove the sha256 entirely from the system but simply to avoid exposing it through the network because of the following reason:
can you please validate the fix and evaluate if this ticket can be closed? |
|
I looked over the diffs quickly, and they look good. It's nice to see code Does the SHA256 provide any demonstrable benefit right now? If not, we think it
|
|
alliright. we perfectly agree with you. by the way for the moment we decided to not remove the sha256 internally in the short term due to the fact that a lot of code need to be changed; anyhow it will be removed entirely in the next stable release. do you agree that for the pentest mitigation we can consider this issue closed? |
|
Can you point me to the code where the SHA256 is currently used? As a short term mitigation, you could just set it to a random value instead of actually hashing the plaintext. I will ask the rest of the team what they think about closing this issue. |
|
allright i agree that in the midterm we can avoid also to calculate the |
|
ok, i've found it easy to remove the sha256 completely =) so the ticket can be surely be closed! |
|
damned github, due to the merge from branch 'fix_issue_822' to 'devel' it has reported this last 3 commits has been reprinted but they are the same of 6 days ago |
|
I reviewed the diff. It looks good. I think it's safe to close this issue. |
|
allright thank you @defuse |
Synopsis:
The SHA256 hash of the files whistleblowers submit are saved and displayed to the
whistleblower and receivers, even when the receiver has a public key configured.
Impact: An adversary who can log in as the whistleblower or the receiver, or who gains access to the
GlobaLeaks Node's database, can check guesses about the file that was submitted. For example, if the
adversary has a list of 1000 files they suspect were submitted, they can compare the SHA256 hash of
each to find which ones (if any) were submitted.
The text was updated successfully, but these errors were encountered: