Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add some security considerations for sites using this API #38

Open
jyasskin opened this issue Apr 19, 2021 · 3 comments
Open

Add some security considerations for sites using this API #38

jyasskin opened this issue Apr 19, 2021 · 3 comments
Labels
security-needs-resolution Issue the security Group has raised and looks for a response on.

Comments

@jyasskin
Copy link
Member

There's a nice paper at https://www.ndss-symposium.org/wp-content/uploads/ndss2021_1C-3_23159_paper.pdf showing how server-side contact discovery APIs can be abused. The exploits don't directly attack this API, but developers using this API need to know that they should defend against them. A security considerations section in this spec seems like a good place to warn people.

@rayankans
Copy link
Collaborator

Thanks for sharing this Jeffrey, it was an interesting read.

This API already applies the only relevant mitigation outlined in the paper (Selective Contact Permissions). When a website requests contact permission from the user, only the contacts / fields explicitly chosen by the user are shared. This is covered in the Security and Privacy section, as well as the relevant algorithms in the spec.

Was there anything else in the paper you were particularly referring to?

@jyasskin
Copy link
Member Author

I think this API's design is good w.r.t the hash reversal mitigations in the paper. The specification could usefully point out the Crawling Mitigations and maybe the "Strengthened Hashing-based Protocols" mitigation to developers who consume the API.

The paper also makes the interesting point that Signal's defense against insider attacks made it increase its rate limits, which made it more vulnerable to crawling. I haven't worked through how this API's one-time-picker design changes the effectiveness of the paper's "Incremental Contact Discovery" suggestion for tightening Signal's rate limits. It'd be good for our security/privacy considerations to say something about how the tradeoffs work.

@samuelweiler samuelweiler added the security-tracker Group bringing to attention of security, or tracked by the security Group but not needing response. label May 18, 2021
@samuelweiler
Copy link
Member

Much of the discussion from the explainer should probably be moved into the spec, proper, in a section on Security Considerations, separate from Privacy considerations. See https://www.w3.org/TR/security-privacy-questionnaire/#considerations

@samuelweiler samuelweiler added security-needs-resolution Issue the security Group has raised and looks for a response on. and removed security-tracker Group bringing to attention of security, or tracked by the security Group but not needing response. labels May 18, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security-needs-resolution Issue the security Group has raised and looks for a response on.
Projects
None yet
Development

No branches or pull requests

3 participants