-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document and mitigate proof-of-file-ownership attack #186
Comments
The core issue is that chunks of data are named as a hash of plaintext data they contain. I guess it might be possible to name them after the hash of the cyphertext, if the encryption is deterministic, but I'm not sure if it doesn't introduce any other issues. Note: IIRC symmetric encryption support is available, but it comes with a downside that it requires passphrase to unlock the repo for writing. In case of symmetric encryption determinism should be easy to achieve in all cases. |
That would not disable the attack. But interesting idea. |
How difficult would an optional pubkey passphrase be? |
Optional pubkey passphrase defeats the purpose. Might as well use symmetric encryption (probably even faster). |
But if there are good reasons for it - it should be fairly straighforward. (I have little time today, so I can't respond to other threads today, sorry!) |
As i get it, the private key used to restore can have a passphrese, but the public key used to backup can not.
If i get it right, this is deterministic encryption. So, given the remote repo contains the config.yml file (which i need to do GC there), and given an attacker has access to my remote repo (and my backup strategy, it's open source), they can prove that i own a specific file, simply by adding it to the repo and seeing no or few new chunks.
If yes,
The text was updated successfully, but these errors were encountered: