Non-Repudiation Not covered in Integrity #1874
Labels
No Label
0.2.0
0.3.0
0.4.0
0.5.0
0.5.1
0.6.0
0.6.1
0.7.0
0.8.0
0.9.0
1.0.0
1.1.0
1.10.0
1.10.1
1.10.2
1.10a2
1.11.0
1.12.0
1.12.1
1.13.0
1.14.0
1.15.0
1.15.1
1.2.0
1.3.0
1.4.1
1.5.0
1.6.0
1.6.1
1.7.0
1.7.1
1.7β
1.8.0
1.8.1
1.8.2
1.8.3
1.8β
1.9.0
1.9.0-s3branch
1.9.0a1
1.9.0a2
1.9.0b1
1.9.1
1.9.2
1.9.2a1
LeastAuthority.com automation
blocker
cannot reproduce
cloud-branch
code
code-dirnodes
code-encoding
code-frontend
code-frontend-cli
code-frontend-ftp-sftp
code-frontend-magic-folder
code-frontend-web
code-mutable
code-network
code-nodeadmin
code-peerselection
code-storage
contrib
critical
defect
dev-infrastructure
documentation
duplicate
enhancement
fixed
invalid
major
minor
n/a
normal
operational
packaging
somebody else's problem
supercritical
task
trivial
unknown
was already fixed
website
wontfix
worksforme
No Milestone
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Reference: tahoe-lafs/trac-2024-07-25#1874
Loading…
Reference in New Issue
No description provided.
Delete Branch "%!s(<nil>)"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I have been testing the LAFS-Tahoe V1.9.2 package. It is observed that during the user/storage-server uploading and downloading(files) processes there is a lack that one critical link missing that is required to track data stored in cloud storage.
Though communication is happening over SSL, a user/server may refuse the sender's/receiver's certificate. So any one of them could be malicious.
Atleast there should be a signed message digest.
So, while uploading a document how a user can trust the Storage Server.
Duplicate of #1422.
Note that "supercritical" priority is only for things that require an immediate point release.
By the way, the relevant security property here isn't nonrepudiability. That would be the inability for the server to deny that it had performed some operation. SSL/TLS does not provide nonrepudiability.
Do You mean that non-repudiability is not the security properties of LAFS? And is it not covered in LAFS?
Replying to calltodsi:
That's right. Are you sure you're not confusing it with another property? Nonrepudiability is normally relevant only for things like contract signing, where a party wants to make a binding commitment that can be verified by anyone who has their public key. I don't think I've seen any storage system that provides it -- although of course you can store signed documents in Tahoe-LAFS.
Ah, do you mean how can a client know which servers are in a grid?
I'm not sure what this ticket is about. How about if I close it and then calltodsi can re-open it and say what the is the security property that he wants to ensure, such as "I want to ensure that a client can tell which servers are on the grid." or "I want to ensure that a client only connects to certain servers." or something.