Rich Freeman via plug on 1 Dec 2021 14:26:46 -0800 |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] kernel, rpm, croc, du, encrypted |
On Wed, Dec 1, 2021 at 4:05 PM Walt Mankowski via plug <plug@lists.phillylinux.org> wrote: > > Ah, I see, I hadn't read the examples very closely. Now that I have, I > have more questions: I did a TINY bit of research as I was curious. Do not consider this as some kind of personal endorsement. It does use technologies I was previously unaware of. > > * Where are the files being stored? The files are directly streamed through a relay unless both ends are on the same LAN. They are not intended to be stored. Of course, the relay could store the encrypted stream without your knowledge. The relay is FOSS and you can use your own. By default it uses a central relay operated by the developer. > * What port are they using? The relay apparently uses TCP ports 9009-9013 by default. This can be tweaked. > * How long do the files stay there? In theory they aren't intended to be stored. Of course anybody with access to your traffic, including the relay, can store it forever. > Assuming they're just using key/value pairs and accessing it over > https, this sounds like a security nightmare. It sounds like if anyone > can guess the codeword they can download the file, potentially > forever. Is there really no authentication component? They're using a technology called PAKE [1], which apparently uses the passphrase as part of the key exchange mechanism to exchange a much stronger session key. I didn't read all the gory details of the math but Wikipedia suggests the concept is sound. Apparently the key exchange mechanism can defeat an MITM, so the connection is effectively secured by a full-length session key and not just the passphrase. In theory that means that attacking any stored network streams is no different from attacking any other intercepted SSL/etc traffic. Now, whether their implementation is secure I couldn't say, but it seems to be backed by some concepts that sound reasonable. This is the first I've heard of PAKE though. One obvious shortcoming is that it sounds like all the traffic goes through the relay. It would be better if the relay facilitated discovery but the clients were able to find some way to directly connect. That would obviously depend on the firewall configs. Otherwise the relay becomes a bottleneck. 1 - https://en.wikipedia.org/wiki/Password-authenticated_key_agreement -- Rich ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug