if i understand correctly, the user's pw would need to be entered both at the time of key generation and also every time a PM is decrypted.EA117 wrote: Wed Jun 26, 2019 3:41 pm Okay. Something about that seems "impossible", since having access to the DB and the file system gives the site owner(s) access to everything the extension has access to, and the extension is able to decrypt them. But perhaps there is still a piece that is not described or not being taken into account.
yes, i think that the extension as-described would only mitigate risks from db and fs theft (of backups perhaps). it would not mitigate risks from the server getting pwned and a bad actor having access to the live site (and certainly would not protect against a malicious admin). they could capture passwords that way easily.EA117 wrote: Wed Jun 26, 2019 3:41 pm Which is how we landed on the assertion "someone viewing only the database information" is who is now locked out of viewing the stored private messages, as opposed to "the site owner(s) were prevented from seeing your message." The site owner(s) have all the same abilities the extension itself has, and is not something the extension can unilaterally protect against.
Much easier:dingus33 wrote: Wed Jun 26, 2019 3:43 pm yup, only way users can protect themselves from admin is to use GPG or something in PMs and handle crypto and keysharing outside of the forum.
Again I must advocate for a use case for this extension or such things.canonknipser wrote: Wed Jun 26, 2019 6:18 pm Just share mail addy or some messenger contact data and communicate outside the board instead of only sharing krypto information outside
As it's built now its kind of trying to recreate the conditions for pgp and is not secure, as others have pointed out. Anyone with malicious intent and admin level access, you can assume, can also change the files to echo out the user password before it's put into the db and hashed itself, must not forget. You can't rely on user passwords.Senky wrote: Wed Jun 26, 2019 7:14 am But it looks like everyone is missing the point here. You as admin can offer your users a real secured channel. Heck, even CIA can't break that one. It is not about users, it is about admins to behave responsible and value user privacy.
Would not take 3 minutes to remove it.Mannix_ wrote: Wed Jun 26, 2019 10:57 am I would honestly suggest for this to be added to the core of phpbb
Technically you are right, but there are cases when an attacker can access files but cannot modify them. In that case he is unable to pull password out of the request.EA117 wrote: Wed Jun 26, 2019 3:41 pm Okay. Something about that seems "impossible", since having access to the DB and the file system gives the site owner(s) access to everything the extension has access to, and the extension is able to decrypt them. But perhaps there is still a piece that is not described or not being taken into account.
That is an excellent idea!EA117 wrote: Wed Jun 26, 2019 3:41 pm Presuming the private key for the user needs to be decrypted and then re-encrypted during a password change (so that the key is encrypted with the new user password), adding some UI to the "password reset" actions available to both users and administrators could be important. Meaning additional warning text for admin password reset, and for user forgotten password reset, that declares what the ramifications will be for changing the user's password without knowing their existing password. Bonus points for the message to be repeated or more insistent if the user actually has sent one or more encrypted messages, and data loss would occur.
The checkbox will be present all the time. UCP option would just check it by default.EA117 wrote: Wed Jun 26, 2019 3:41 pm Although the benefit of being "entirely transparent" is clear, the users trust in the site owner & the extension might be improved by being able to see "this message is actually encrypted." Meaning, although they might eventually leave the checkbox checked to "always decrypt by default", giving the reader a checkbox to let them see what the message looks like without applying decryption could improve their confidence that "something is being protected" now.
That leads me to an idea of hashing password client-side. Opponents might say that again, someone with access to files can output a small JS code that will track user keyboard and send it over to the server. But such an extreme case can apply to any end-to-end encrypting messenger: Is protonmail secure? Anyone who can access their filesystem can obtain your password and decrypt the mails. Do we consider protonmail insecure now? Any browser extension can potentially read your password as you type it. Is any browser-based messenger insecure now?Toxyy wrote: Wed Jun 26, 2019 7:02 pm Anyone with malicious intent and admin level access, you can assume, can also change the files to echo out the user password before it's put into the db and hashed itself, must not forget. You can't rely on user passwords.
You won't be able to report the PM directly. You can, however, forward it to the moderator in decrypted form.canonknipser wrote: Thu Jun 27, 2019 9:48 am What about reporting a encrypted PM? Do the moderators handling the report need the keys as well?
I understand your points, it really is much simpler with using reporting button. But in order for messages to be truly encrypted, I can't allow moderators to look at them. If every moderator owned a key for every message, it beats the whole purpose.
But moderators would only be able to read them if they were reported to them. Reporting of messages MUST remain as a feature.Senky wrote: Thu Jun 27, 2019 1:47 pm I can't allow moderators to look at them. If every moderator owned a key for every message, it beats the whole purpose.
Why not simply offer the option to decrypt the PM and report it at that point? You would need a clear info message stating the PM won't be encrypted anymore once reported though.Senky wrote: Thu Jun 27, 2019 1:47 pm I understand your points, it really is much simpler with using reporting button. But in order for messages to be truly encrypted, I can't allow moderators to look at them. If every moderator owned a key for every message, it beats the whole purpose.
Mick wrote: Thu Jun 27, 2019 11:27 am I think this is a great idea but it would be better in the core and UCP selectable. In fact it should be on by default IMHO.