-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Privacy issue: Issue template is to "chatty" #27
Comments
I'd like to add
Can we get attention on this @juliushaertl ? Btw, thanks for the last update, it feels like 1.0. ;) |
mail_from_address should be private too. |
I would also include:
in this list of unnecessarily extensive default information. |
@juliushaertl Any idea when this could be implemented? I would do it if I knew how. |
@enoch85 Cannot make any estimations. I currently have a lot of other stuff todo. If you want to dig into, it should be fairly easy. We need a list of the configuration keys that should be filtered and just work though the existing configuration items and remove them when they are in the list: https://github.com/nextcloud/issuetemplate/blob/master/lib/Settings/Admin.php#L248-L263 |
@juliushaertl I feel you, same for me. Can't give much time to Nextcloud I'm afraid. :( Keep it up! |
I could give it a shot on the weekend and make a pull request. Is this if-true-condition something left in there for testing purposes? I've also noticed, that there would be the possibility to adjust the $sensitiveValues-Member in the SystemConfig-class, we maybe could adjust. Or you think this would be too intrusive? |
@Fiech That would be great. It would indeed make sense to create a PR against the server repo to have the sensitiveValues list updated there. |
In accordance with the issuetemplate app issue: nextcloud/issuetemplate#27 Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
In accordance with the issuetemplate app issue: nextcloud/issuetemplate#27 Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
In accordance with the issuetemplate app issue: nextcloud/issuetemplate#27 Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
Party fixes nextcloud#27. PHP_OS contains the OS, PHP was built on and conent detail is build-dependant. Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
Party fixes nextcloud#27. PHP_OS contains the OS, PHP was built on and content detail is build-dependant. Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
Partially fixes nextcloud#27. PHP_OS contains the OS, PHP was built on and content detail is build-dependant. Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
Ok, I made two PRs. One against the server repo and one against this one. Everything but the hostname issue is being taken care off by the server one, but for the hostname to disappear, we have to change the ServerSection file. Actually, the method used (constant PHP_OS) is not the best anyway, because PHP_OS is the OS PHP was built on, not the one it's running on. Also the actual content detail of the constant is not the same for each system. I changed it to use php_uname() instead. It's a bit ugly, because this function does not accept more than one mode selector at a time... Also, sorry for the many mentions, but apparently I'm too stupid to write proper english today... |
In accordance with the issuetemplate app issue: nextcloud/issuetemplate#27 Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
In accordance with the issuetemplate app issue: nextcloud/issuetemplate#27 Signed-off-by: Johannes Schlichenmaier <johannes@schlichenmaier.info>
Ok, so on request by @nickvergessen we redo the filtering for Maybe someone can reopen this issue? |
Ok, so I thought about this a bit... according to @nickvergessen wrongly configured We could now come up with a convoluted way to filter out sensitive information like:
in a way that removes the sensitive part allthewhile leaving possibly misconfigured parts as is, for example with a mix of regular expressions and the filter_var function. The problem is that this would require the configuration already to be at least syntactically corrrect, something we cannot reasonably expect. Also this kind of catch-all solution would be a hell of a hack... So instead, I would suggest, we offer the possibility to quickly remove all sensitive values with the click of a button (together with a warning that this might impede the helping process) and also notifiy the user to the possible sensitive values being sent to the issue tracker for self-censoring (who knows, maybe they then already notice something being wrong with them). Thoughts? |
I think that sounds like a good idea. 👍 |
Just to make sure that all fields from #7959 are mentioned here, too.
|
we use an S3 Bucket as primary storage. Could this info be removed as well, please?
additionally i removed and but this might be very special case here |
In the LDAP config info, it includes a key-value-pair:
This probably also should be anonymized - and maybe some additional stuff in the LDAP section like exact user names etc. |
IMHO there is room for improvement in protecting the privacy of a server installation in the template report produced by version 0.5.0 of the tool.
see #157 |
See the comment here, why those values are not "sensitive": |
@nickvergessen Thank you. Now I better understand the burden to the forum and the developers involved when basic configuration problems are reported as bugs. Nobody is perfect and this mishap could happen with anybody unfortunately. However, IMHO this does not prove the a.m. values are not "sensitive" and I continue in calling exposing the server domain and cli.url settings unwise in general. Please recall one of Nextcloud main advertising is:
Ref the Issue Template app I would prefer a more flexible approach proposedly with an informative text and a checkbox while producing the report by help of the tool. I am aware I could tamper with the settings of the tool locally and/or may edit any "sensitive" values manually before copying the report as a GitHub issue. Last not least there is an enterprice solution available. Nevertheless in the light of the Nextcloud principles and of the FOSS project community efforts I would prefer an improvement as proposed above and as mentioned in #157 before. |
Sorry, I really disagree there. A domain is nothing sensitive. There are public records about those. Just search for ones with a You should always treat your software/server like it is accessible by anyone, because that is what it is, when it is in the public internet. Your data is still save and protected. But your login page and domain are no secrets. Any other claim is Security by obscurity |
I think as long as people feel unwell about certain points of information -- which are not even relevant for debugging -- included in the template, this information should be excluded as it might deter people from submitting bug reports. |
Well this issue here is still open. We can add an option to remove the stuff. Just wanted to state why it 1. shouldn't be default 2. does not make anything more secure. But I also get your points. So fine by me (see the comments in the PR I linked above for a good solution) as long as it's opt in, to allow easy-help if people are not "paranoid". |
I welcome this discussion. However, I disagree in some aspects.
One should not flip Privacy and Security without applicable difference. Furthermore, the tool is aimed at providing data on presumably "bugged" i.e. possibly "failing" environments. I dont want to reach too far but there is good cause for the principles of Responsible disclosure in failing information technology. I appreciate the offer of a more open approach and will welcome further efforts. Thank you. |
Just so you know, this is a real issue, see: nextcloud/spreed#2312 :P In the meantime I'm experienced enough to know the values which are bugged. But still without the values the user has set, there is no way to help them. |
Is there a way for apps to communicate to this one, which app specific values are sensitive? The Sentry app also has sensitive values that should be redacted:
|
Yes, send a pull request to the server changing this file: |
* important for issue template generation * tries to fix nextcloud/issuetemplate#27
So how can the "filtered" values be obtained? And have no method to view what they are set at in the running instance. |
Either |
Thanks for the reply. |
I like to use issuetemplate because it helps providing important info to the developers. I am totally happy to share what apps I use, what device the instance is running on, etc. But I am not happy to share info that would allow others to identify my server, the url(s) it listens to, etc. In my opinion the following fields should be considered as SENSITIVE VALUE and REMOVED. I even doubt that this info is important for people debugging an issue...
Edit:
Probably a good starter issue. I've added some implementation hints here: #27 (comment)
The text was updated successfully, but these errors were encountered: