You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
During the fixes review we noticed that the SecureDrop Workstation's SQLite database file located in the ~/.securedrop_client``/svs.sqlite path in the sd-app VM, has too broad file permissions (-rw-r--r--) so it is readable by other users. This database contains sensitive data such as messages, replies or submissions file paths (but not their content). The database's parent directory (.securedrop_client) has proper permissions (-rwx------) so it isn't possible to access the database file directly. However, if an attacker found a way to enter that directory or reach the database file through other means, they could read sensitive data such as messages sent by sources or journalists.
Qubes is a single user OS configured with passwordless sudo, but we still generally agree that we want to enforce conservative permissions as was also done in #1226, so this is a finding that we still want to address.
The text was updated successfully, but these errors were encountered:
Note that this also applies to config.json and sync_flag in the ~/.securedrop_client folder on sd-app. As part of resolving this issue, we can consider phasing out use of these files (see #1224 re: config.json).
To close out this issue let's ensure all files in the ~/.securdrop_client directory have the proper restricted permissions. Removal of config.json is being tracked in the issue mentioned above (#1224) and we can track removal of sync_flag here: #1255
As noted in the December 2020 SecureDrop Workstation audit:
Qubes is a single user OS configured with passwordless sudo, but we still generally agree that we want to enforce conservative permissions as was also done in #1226, so this is a finding that we still want to address.
The text was updated successfully, but these errors were encountered: