[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #27551 [- Select a component]: Build HTTPS Everywhere with the SecureDrop custom ruleset update channel



#27551: Build HTTPS Everywhere with the SecureDrop custom ruleset update channel
--------------------------------------+--------------------
     Reporter:  legind                |      Owner:  (none)
         Type:  enhancement           |     Status:  new
     Priority:  Medium                |  Milestone:
    Component:  - Select a component  |    Version:
     Severity:  Normal                |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |   Reviewer:
      Sponsor:                        |
--------------------------------------+--------------------
 Related: https://github.com/freedomofpress/securedrop/issues/3668,
 https://github.com/EFForg/https-everywhere/blob/master/docs/en_US/ruleset-
 update-channels.md, https://blog.torproject.org/cooking-onions-names-your-
 onions

 Blocked by: https://trac.torproject.org/projects/tor/ticket/10394

 There has been some discussion on the SecureDrop issue tracker on the
 possibility of FPF maintaining their own SecureDrop custom rulesets update
 channel.

 A "ruleset" is a strictly formatted XML file that defines how HTTPS
 Everywhere issues redirects.  HTTPS Everywhere comes bundled with
 thousands of these rulesets that tell it how to secure sites.  An "update
 channel" is a new way for HTTPS Everywhere to have rulesets delivered to
 the extension without publishing a new version of the extension itself.
 Rulesets are periodically checked for on a publicly accessible, known URL
 and verified via the WebCrypto API, see https://github.com/EFForg/https-
 everywhere/blob/master/docs/en_US/ruleset-update-channels.md#update-
 channel-format--logic for more info on how this works.  Currently the Tor
 Browser includes the `EFF (Full)` update channel.  Requests to the update
 channels to check for ruleset updates are made every 24 hours.

 The idea here is for FPF to maintain its own update channel which forwards
 URLs of the format `http://0.0.0.0/theintercept.com.securedrop` to the
 onion URL for that SecureDrop instance.  This gives a few distinct
 advantages:

 1. It allows easier discovery of SecureDrop sites
 2. It allows FPF to quickly rotate keys in case of key compromise or
 vulnerabilities, as has happened in the past with HeartBleed
 (https://freedom.press/news/securedrop-and-the-openssl-vulnerability/)
 3. If someone accesses a site of this format in Chrome browser, it will
 not leak the DNS request.  This provides no additional security in
 Firefox, since Firefox already blocks DNS requests for the `.onion`
 pseudo-TLD.

 Understandably, Tor Browser may be wary of adding an additional update
 channel, maintained by another entity, which has the arbitrary ability to
 redirect URLs.  That's why HTTPS Everywhere has added the concept of
 `scope` to update channels.  `scope` defines some regular expression for
 URLs on which a ruleset update channel is allowed to operate.  For
 instance, in the case of SecureDrop, you can define the scope to be
 `https?://0\.0\.0\.0/[^/]+\.securedrop($|/)` so that this update channel
 only operate on URLs of the format given above.

 This update channel would have to be added to HTTPS Everywhere for the Tor
 Browser (in https://github.com/EFForg/https-
 everywhere/blob/master/chromium/background-scripts/update_channels.js) at
 build-time.  Since all customizations are overwritten when the extension
 is updated, this is also blocked by
 https://trac.torproject.org/projects/tor/ticket/10394

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27551>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs