Skip to content

Disclosure

aagbsn edited this page Oct 12, 2013 · 2 revisions

OONIThreat-ModelRolesUse-CasesThreatsImpactsDisclosure


Contents

How to Disclose Security Issues

First, evaluate the risk of the issue, then decide how to communicate it to the OONI developers, then track progress on the issue to ensure it is properly handled.

Evaluate the Risk

If you have discovered an issue with ooniprobe or the MLab deployment of oonib, please take a few moments to step through this mental process:

  1. Are you certain the issue only affects unreleased development versions of the software?
  2. Do you understand all of the Roles which are impacted by this issue?
  3. Do you know who all of the actual users of the software are, including all ooniprobe Operators?
  4. Do you understand all of the affected people's risk tolerances?

If the answer to any of these is not "Yes, without doubt", then please disclose this issue confidentially. Even if the issue seems minor, please consider the potential situations of the userbase, and remember that you may not be aware of who those people are.

Remember, if you are too cautious, the worse that happens is a developers just create a bug ticket for your issue. If you are too incautious, you may harm real people.

Confidential Disclosure

In order to confidentially communicate an issue, you must first ensure you are only communicating with your intended audience. The best option is to tell them in person, but this is rarely practical, so the next best option is to use appropriate technology for confidential communication. We recommend using a properly installed, secure OTR-enabled client.

Installing Secure Communication Software

OTR (Warning: Non-SSL), or "Off-the-Record Messaging" is a protocol and software to improve one-on-one instant messaging.

Pitfall: Google Chat has a feature called "Off the Record" which is unrelated and provides no security benefits.

Unfortunately, selecting secure software and installing it security is highly error prone process which depends greatly on your background and computer access. We recommend joining #ooni on the oftc.net IRC network (here is a webclient) to ask for advice on securely installing OTR software.

Pitfall: Do not disclose sensitive details throught this IRC channel!

Who

Please disclose your security issue to a someone on the Communication page who:

  1. Is labelled as a Disclosure Contact
  2. Is in the (Tor/OONI) organization; and
  3. Has a listed OTR fingerprint.

Pitfall: When you load this wiki, ensure the URL begins with https:. You may need to click the URL bar to see the beginning of the URL.

Risk: The https: scheme is vulnerable in various technical and hard to anticipate ways. Your best hope is to verify you use a recent version of firefox or chrome. See Authenticating an OTR session below for advice.

Risk: Anyone with the capability to alter the wiki contents may attempt to confuse you by altering the OTR fingerprints there. This includes employees and contractors at Github, at various third party websites which Github relies on, members of OONI, members of Least Authority, members of M-Lab, and potentially more. See Authenticating an OTR session below for advice.

Authenticating an OTR Session

To increase your confidence in OTR fingerprints, and to help overcome the risks mentioned above, the best strategy is to distribute and share those fingerprints in multiple channels using decoupled technology. For example, check the Communication page, and ask for confirmation in IRC, and ask for confirmation in mailing lists. This wiki is available as a git repository, so those who clone that history to a local machine can notice suspicious edits.

The best mitigation is to get a fingerprint from one of the developers directly, such as on a business card.

Once you are confident in a fingerprint, start a session with the appropriate reciepient (see Who above), then display and compare the fingerprint of that session with the fingerprint you gained confidence in above.

Clone this wiki locally