-
Notifications
You must be signed in to change notification settings - Fork 1.5k
Integrate with the IP reputation service #91
Comments
@g-k is the reputation man. |
Not sure what violations/abuse to expect, but we'd want to:
I can write patches for the integration. |
@g-k Is there a mozilla account for virustotal or for similar APIs? If not, I can go ahead and start development with a personal account. |
@abhinadduri Thanks for picking this up! You can probably register for a public one for testing/development. I bet we'll hit the 4 requests/minute limit for a public API key quickly and want a private one. @jvehent does cloud services security/secops have one? I don't think we do. EIS or RelEng might have keys too. We might as well look into getting another one, since this is a different use case. Not sure what privacy/security review this project has undergone, but we might need to add a notice saying we'll send hashes of your unencrypted files to VT somewhere too. |
I think we should keep this feature under the hood in case we run into
abuse issues, or for the graduation from testpilot. It's a bit too much
engineering for an experiment, I think.
|
@jvehent In that case, should I move this issue to a later (maybe v2) milestone? |
That seems reasonable to me. |
@g-k should we be using this service for simple rate limiting or something else? |
@dannycoates it can be used for rate limiting or blocking actions from IPs with poor reputation. It's up to the application to decide what to do with the reputation data. |
@g-k are you still interested in writing a patch for this? :) |
@wresuolc I can. Is Send graduating from Testpilot? |
I think it's going to stay in Test Pilot for the short term. @johngruen is there a party line for Send graduation? |
Isn't the whole point of end to end crypto that users can send whatever they want? How would we tell if people upload malware, short of them sharing the link online? What if a security researcher repeatedly uses the same IP to send samples to a friend? Just my two cents here. |
@bmintz we wouldn't discriminate on content. We'd likely use this to limit abuse of bandwidth and storage. |
@dannycoates so what's this about VirusTotal? In what situations would that come in to play? |
Old news. The very early design included the hash of the unencrypted file. Now we use GCM to ensure the file's integrity and have no knowledge of the file contents or metadata (aside from size). |
@jvehent can you give us more details on how to do this? (links to docs?)
The text was updated successfully, but these errors were encountered: