-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[scanner integration] Check integration plan against a threat model for landing pages #512
Comments
Capturing my notes from discussion with @emkll today. @emkll - please review; if this recap looks good to you and @redshiftzero , we can close this issue. Security contextIt's important to note that all SecureDrop directory pages display a prominent banner encouraging the use of the Tor browser. Clearnet access to SecureDrop.org and the browsing of landing pages in a clearnet browser pose inherent risks to sources that cannot be trivially mitigated against except through use of Tor. For example, while a landing page might follow our recommendations on caching headers, this does nothing to eliminate forensic evidence in browser histories. The landing page scanner allows us to detect issues that can be remedied, but without a direct working relationship with the operators of a SecureDrop instance, there may be more severe security issues unknown to us. Operational security failures in the handling of USB drives, passphrases, and access to the servers are among the most likely security risks. Visitors of landing pages may be passively monitored (e.g., via third party assets embedded in landing pages). They may also be actively targeted (e.g., via malicious scripts and phishing attacks). While we can recommend mitigative actions that site operators can take against active attacks, the security characteristics of the web server the landing page is hosted on are ultimately unknown to us, and we cannot make credible statements about the true risk to the user that a landing page has been compromised. Incentives and transparencyWhen it comes to the security properties of landing pages, we can incentivize good behavior or penalize bad behavior. We can inform end users actively about risks or privately reach out to news organizations operating SecureDrop. This integration plan tries to carefully balance these different strategies:
Landing page issues we can detect with the current scanner are summarized in Appendix B of the original scanner integration proposal. We also require the ability to detect third party cookies (#495), the Referrer-Policy header (#515) and direct .onion links (#508) prior to launch. Reasons why we consider these issues worthy of a user warning are identified in the respective issues. Issues warranting outreach, but no user-visible warningThe following issues will be recorded and used as part of outreach to news organizations. In future, all or some of them will likely be part of the security standard required for earning a "Verified" badge.
|
Thanks for updating the ticket @eloquence, this looks good to me. With the updated requirements in the proposal, I think we have a good rationale for the scoring, which are at a high level:
|
That's a very nice concise summary - thanks, @emkll. We might roll other stuff beyond headers into "Verified", but that's TBD down the road. :) |
Thank you for the rigorous enumeration here @eloquence & @emkll ❤️. One thought: in the same category as DNS requests to .onion addresses are direct links to securedrop.org. While this obviously doesn't help sources that find SecureDrop through the SecureDrop website, it can help in the (hopefully more common) situation where sources find SecureDrop via the news organization's tips/landing page, where discouraging direct links back to the SecureDrop.org website may prevent them from being trivially identified. Otherwise I am on board 100% with this plan. |
Thanks, @redshiftzero ! I agree that links to securedrop.org are problematic and we should scan for them (we are tracking this as #507). I'm doubtful that we should warn about it on the directory entry pages (because warnings seem most useful to me when they're directly relevant to what the user is currently doing, and they are on securedrop.org), but it seems like the kind of issue that should be rolled into verification at a minimum. |
We don't (yet) offer an Onion URL for SecureDrop docs, but once we have that, it'll accommodate. Can immediately spin-up a unique THS for the docs—integrating inside the existing http://secrdrop5wyphb5x.onion would take more work. |
A separate docs THS would be excellent as a starting point. We do recommend pointing to the existing .onion service in https://docs.securedrop.org/en/stable/deployment/landing_page.html#avoid-direct-links-to-securedrop-org and can also emphasize a docs service address there, once it exists. |
Sure, my sole concern with a separate THS is future compatibility, but we can handle that separately, e.g. via redirects or otherwise. Happy to handle. |
As part of epic #488, we should ensure that the proposed "moderate" and "severe" warnings, and the proposed addition of remaining known instances to the SecureDrop directory, are consistent with a reasonable threat model for sources.
The current plan makes several assumptions:
A primary candidate for consideration in the "moderate" warning category would be the failure to set a reasonable referrer policy. However, we should go through the landing page issues we can detect systematically and decide if any should be elevated to the "moderate" or "severe" category.
The text was updated successfully, but these errors were encountered: