Open naftis opened 7 months ago
@eduffus @rikukissa I think we should consider discussing & prioritising this in 1.5 as this could be a way to steal a staff members password.
So to play this out, the attack vector is:
My interpretation is that while this could happen, it's not a likely attack vector. VPN and 2FA will prevent logging in even if login credentials are compromised. We should still change the approach not to let the QR control the scanner's device.
Another requirement for the next iteration of the QR reader will be that scanning needs to work offline. Burkina Faso is asking for this. The main difference in approach, that will support both fixing the phishing attack and offline, is the staff member using an existing OpenCRVS feature for scanning the QR. That way we can remove the URL from the QR and embed whatever information we want in the QR code.
[certificate details].[checksum]
. The QR reader app would read this and use a known public key to verify the checksum is correct and created by the country config package using a secret key.@rikukissa I think the attack vector is simpler, although this is more of a operations scam and not a password phishing issue.
A few noteworthy challenges with offline digital signatures embedded to QR:
The QR code link includes the https://farajaland.opencrvs.org/... -prefix for the URL. Imagine someone adding their own QR code with https://farajaland.0pencrvs.org/... and showing something that doesn't exist in reality. Could we only use the URL-suffix for the QR codes?
We would need to design a way to scan the QR code within OpenCRVS.