imgbi / img.bi

img.bi main website
GNU General Public License v3.0
187 stars 27 forks source link

Obsfuscate download URL! (metadata-leak) #61

Open rugk opened 8 years ago

rugk commented 8 years ago

Currently one can download all the uploaded files by randomly trying (brute-forcing) URLs under /download, because only two letter/number combinations . As they are encrypted this is of course no big problem, but I still don't like it because it has one big problem: Metadata!

And after Snowden we should know that metadata matters.

So what one can get out by monitoring download:

Of course if attacks against AES or the specific AES implementation are found you have also a serious problem, but when this happens you have a huge problem in general and this easy file access might be your smaller problem. However a level of obscurity (which is achieved with more complex URLs in the download location) might at least prevent direct, easy attacks in this case.

So all in all: Please make the download location more complex, so one has to know the URL for downloading a specific file. Relying on the encryption is one way, doing everything to prevent attacks (including metadata leaks) is another...