Git Product home page Git Product logo

Comments (7)

micahflee avatar micahflee commented on August 21, 2024 3

In the next few days I will publish a detailed blog post about dangerzone that answers all these questions. But in short, you can think of dangerzone as taking the original document, printing it, scanning it, then OCRing it -- except all done in software.

So it will remove everything from the document except for visual watermarks. It can't remove printer dots, probably can't remove hidden messages in bits of each pixel, can't remove stuff like different kerning for different copies of a doc. But it will remove everything else (including metadata).

from dangerzone.

rarecoil avatar rarecoil commented on August 21, 2024 1

@micahflee i saw this on hacker news earlier. thank you for working to build some new tooling for dealing with a pretty unreliable format in a system that looks to be pretty easy to use.

with a tool like this that is meant to handle potentially hostile data, i believe it is important to explain the threat model for this tool in the README, similar to projects like qubes and whonix. people can hurt themselves trusting a tool without understanding what threats it is actually meant to protect them against and what the attacks against the system are.

in this current proof of concept, dangerzone is expecting a lot out of docker's default configuration, with the only change i saw from a default docker run being to disable network access. this leaves a lot of attack surface up to default configurations, and i believe that tool advertised to handle hostile data should be built with a pretty paranoid threat model in mind.

for a targeted or relatively sophisticated adversary class, a docker container in a relatively default state should be best assumed a fragile security boundary to start. there's a good amount of hardening that can still be had. this is a rabbit hole of hardening for sure; there are hardware resource constraints that can be placed on the container for denial of service, sign the default image, use various --security-opt features such as no-new-privileges (easy) or seccomp for syscall whitelisting, to name a few.

in my opinion, parts of the cis docker benchmark and the above documentation is a good minimum baseline to target and explain in the threat model.

from dangerzone.

micahflee avatar micahflee commented on August 21, 2024 1

I published a blog post (and linked to it from the readme) that goes into much more detail about how dangerzone works: https://tech.firstlook.media/dangerzone-working-with-suspicious-documents-without-getting-hacked

And @rarecoil thanks for the feedback. I've opened a new issue about container hardening #52

from dangerzone.

techybuddha avatar techybuddha commented on August 21, 2024

It stops us from building highways.

Death occurs on highways.

from dangerzone.

CommonLoon102 avatar CommonLoon102 commented on August 21, 2024

Does it protect against exploiting vulnerabilities in the kernel?

from dangerzone.

CommonLoon102 avatar CommonLoon102 commented on August 21, 2024

It would be useful to tell the users to turn off thumbnail view in their OS, otherwise the game is already lost if they navigate into the folder where the malicious PDF resides. (Even then, it is not 100% percent that the thumbnail is not generated in the background, maybe it is just not shown, maybe it is easier to just not use any GUI desktop environment.)

from dangerzone.

fabionatali avatar fabionatali commented on August 21, 2024

I was redirected to Dangerzone from the now discontinued PDF Redact Tools.

As the name implies, "PDF Redact Tools helps with securely redacting and stripping metadata from documents before publishing" (source).

If redacting metadata falls within Dangerzone's scope, it might be useful to state it on the project webpage and its readme file. To some extent, metadata redaction is implied in the "How it works" section but an explicit mention might be helpful?

from dangerzone.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.