Skip to content
This repository has been archived by the owner on Sep 4, 2023. It is now read-only.

Blinding potentially leaks information #37

Open
ryanbnl opened this issue Jun 15, 2020 · 7 comments
Open

Blinding potentially leaks information #37

ryanbnl opened this issue Jun 15, 2020 · 7 comments

Comments

@ryanbnl
Copy link

ryanbnl commented Jun 15, 2020

The latest solutions architecture mentions doing random uploads to a dummy url. The communication is covered by TLS but it can still leak information:

a. Hitting a different code path has a high chance of releasing information via timing.
b. Difference in message sizes, the endpoint names are of equal length in the proposal.

They're easy to cover: you're almost certainly using a queue for /upload for scaling and as a strategy to avoid timing attacks. The messages can be dead lettered.

For B you can either add random jitter to requests or normalize the endpoint names. The latter can be handled by infra, using a url rewriter internally for example.

@ryanbnl
Copy link
Author

ryanbnl commented Jun 16, 2020

Update: the diagram in the solution architecture is outdated; the swagger API has already moved to 8-character method names, which covers part of what I mentioned.

@ijansch
Copy link
Member

ijansch commented Jun 16, 2020

Correct, point b is covered by having 8 letter requests AND padding in both request and response.

point a is covered by the api gateway that randomises timing. I'll leave this open because I have to check if point a is already in place.

@JolandaVerhoef
Copy link
Contributor

@ijansch do you have an update on this?

ijansch pushed a commit that referenced this issue Jul 24, 2020
Tweaked values after consultation with validation team
@github-actions
Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

dirkx pushed a commit that referenced this issue Sep 30, 2020
Tweaked values after consultation with validation team
@github-actions
Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@github-actions
Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@github-actions
Copy link

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants