Hi all, but especially warner and ckarlof,

From [1]:

"""
There is no MAC on wrap(kB). If the keyserver chooses to deliver a bogus wrap(kB) or kA, the client will discover the problem a moment later when it talks to a storage server and attempts to retrieve data from an unrecognized collection-ID (since we intend to derive collection-IDs from the key used to encrypt their data, which will be derived from kA or kB as appropriate). It might be useful to add a checksum to kA and wrap(kB) to detect accidental corruption (e.g. store and deliver kA+SHA256(kA)), but this doesn't protect against intentional changes. We omit this checksum for now, assuming that disks will be reliable enough to let us never experience such failures.
"""

Our current plan is to bucket user's sync storage by the tuple of (email, key-fingerprint, and certificate generation) [2]. It's worth calling out that clients that don't compute keys correctly, or are intentionally misled about their keys, will appear to the sync protocol as being the only client in the cluster (since clients learn about their peers via the clients collection).

I don't think we need to take any action other than to update the onepw docs.

Nick

[1] https://github.com/mozilla/fxa-auth-server/wiki/onepw-protocol

[2] https://bugzilla.mozilla.org/show_bug.cgi?id=959441
_______________________________________________
Sync-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/sync-dev

Reply via email to