Add authentication for WUI access #1911

Closed
opened 2013-01-31 11:58:51 +00:00 by luckyredhot · 7 comments
luckyredhot commented 2013-01-31 11:58:51 +00:00
Owner

At the moment anyone can access Tahoe-LAFS WUI and perform dangerous tricks such as filling up storage space.
Workarounds are using iptables and nginx as proxy to Tahoe-LAFS.

It would be very nice to have WUI's own authentication capability.

At the moment anyone can access Tahoe-LAFS WUI and perform dangerous tricks such as filling up storage space. Workarounds are using iptables and nginx as proxy to Tahoe-LAFS. It would be very nice to have WUI's own authentication capability.
tahoe-lafs added the
code-frontend-web
normal
enhancement
1.9.2
labels 2013-01-31 11:58:51 +00:00
tahoe-lafs added this to the undecided milestone 2013-01-31 11:58:51 +00:00

Brian has ideas and even, IIUC, a working prototype that controls access to a WUI.

This ticket is related to #1455, #1859, #1447, #1215, #860, #855, #587. I'm not sure if is is a duplicate of one of them or some combination of them. luckredhot: could you please clarify this ticket by spelling out what would allow us to close this ticket as "fixed"? I think it might be something like "All and only people who've been explicitly authorized by the node admin can use the WUI.". Does that sound right?

Brian: please advise on how this ticket should be written.

Brian has ideas and even, IIUC, a working prototype that controls access to a WUI. This ticket is related to #1455, #1859, #1447, #1215, #860, #855, #587. I'm not sure if is is a duplicate of one of them or some combination of them. luckredhot: could you please clarify this ticket by spelling out what would allow us to close this ticket as "fixed"? I think it might be something like "All and only people who've been explicitly authorized by the node admin can use the WUI.". Does that sound right? Brian: please advise on how this ticket should be written.
luckyredhot commented 2013-02-05 11:12:23 +00:00
Author
Owner

Under authentication I've just meant Basic access authentication: http://en.wikipedia.org/wiki/Basic_access_authentication described by RFC 2617 which can prevent accessing UI without providing login/password pair.

Of course it may be optional and also combined with other security techniques.

It would be also interesting to look on Brian's prototype.

Under authentication I've just meant Basic access authentication: <http://en.wikipedia.org/wiki/Basic_access_authentication> described by RFC 2617 which can prevent accessing UI without providing login/password pair. Of course it may be optional and also combined with other security techniques. It would be also interesting to look on Brian's prototype.
davidsarah commented 2013-02-06 06:33:16 +00:00
Author
Owner

Basic authentication is insecure unless over a secure channel (e.g. TLS).

Basic authentication is insecure unless over a secure channel (e.g. TLS).
luckyredhot commented 2013-02-07 13:38:42 +00:00
Author
Owner

Replying to davidsarah:

Basic authentication is insecure unless over a secure channel (e.g. TLS).
Actually data transfer from Tahoe-LAFS WUI is also not secure due to it uses plain HTTP instead of HTTPS.
Ticket's goal was not to ensure everything is secure but to ensure that intruders do not have access to WUI.

Replying to [davidsarah](/tahoe-lafs/trac-2024-07-25/issues/1911#issuecomment-90885): > Basic authentication is insecure unless over a secure channel (e.g. TLS). Actually data transfer from Tahoe-LAFS WUI is also not secure due to it uses plain HTTP instead of HTTPS. Ticket's goal was not to ensure everything is secure but to ensure that intruders do not have access to WUI.
davidsarah commented 2013-02-08 19:01:58 +00:00
Author
Owner

Replying to [luckyredhot]comment:4:

Replying to davidsarah:

Basic authentication is insecure unless over a secure channel (e.g. TLS).
Actually data transfer from Tahoe-LAFS WUI is also not secure due to it uses plain HTTP instead of HTTPS.
Ticket's goal was not to ensure everything is secure but to ensure that intruders do not have access to WUI.

I will rephrase.

Basic authentication does not provide secure authentication unless over a channel that already provides confidentiality.

Replying to [luckyredhot]comment:4: > Replying to [davidsarah](/tahoe-lafs/trac-2024-07-25/issues/1911#issuecomment-90885): > > Basic authentication is insecure unless over a secure channel (e.g. TLS). > Actually data transfer from Tahoe-LAFS WUI is also not secure due to it uses plain HTTP instead of HTTPS. > Ticket's goal was not to ensure everything is secure but to ensure that intruders do not have access to WUI. I will rephrase. Basic authentication does not provide secure authentication unless over a channel that already provides confidentiality.

It is possible to access the WUI over TLS: source:docs/configuration.rst#overall-node-configuration.

It is possible to access the WUI over TLS: source:docs/configuration.rst#overall-node-configuration.
luckyredhot commented 2013-04-25 11:35:41 +00:00
Author
Owner

Ok, I have explained authorization techniques in FAQ https://tahoe-lafs.org/trac/tahoe-lafs/wiki/FAQ#Q30_authorization.
No need to implement Tahoe own authorization at the moment.
If someone need it you may reopen the ticket.

Ok, I have explained authorization techniques in FAQ <https://tahoe-lafs.org/trac/tahoe-lafs/wiki/FAQ#Q30_authorization>. No need to implement Tahoe own authorization at the moment. If someone need it you may reopen the ticket.
tahoe-lafs added the
wontfix
label 2013-04-25 11:35:41 +00:00
luckyredhot closed this issue 2013-04-25 11:35:41 +00:00
Sign in to join this conversation.
No Milestone
No Assignees
2 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Reference: tahoe-lafs/trac-2024-07-25#1911
No description provided.