Is the content safe contains within a long URL, without any password to open this URL? #1270
Replies: 2 comments 9 replies
-
See also: https://sebsauvage.net/wiki/doku.php?id=php:zerobin#how_does_it_work In short, that long URL contains two pieces:
The identifier is a Fowler–Noll–Vo 1a hash of the submitted paste (used to be md5, which was controversial/misleading). It only serves to avoid that the same content is uploaded twice (at the same time). If a paste with the same hash already exists, it is rejected. It is only 8 bytes long, so with "only" 2^64 requests, all possible pastes of an instance can be retrieved. This is not impossible, but would likely take many years if not parallelized massively. Such an operation would likely trip up any DDoS protections of the providers that host your instance and get blocked on that end. But the pastes stored / retrieved contain an encrypted payload. To actually decrypt & read the contents of that message, the key is required. It is a cryptographic random number, generated by the paste creator. Assuming no additional password is set and no weakness in AES being discovered, it could be "brute-forced", that is discovered by trial and error, by trying to decrypt the message at most 2^256 times. At this time we would assume that to take a very long time, longer than either of us will likely remain alive. So to your question, "is the content safe": Your content should be hidden, as long as the URL is not shared/intercepted with/by unwanted parties. But the meta-data of the paste is not hidden - that includes the time of the paste creation, which IP created it, which IP accessed it and when, etc. You can increase confidentiality by: Creating pastes as "burn-after-reading", so it can only be opened once and immediately gets deleted (less risk for third parties finding it by walking the identifiers), creating it with a password set or using a different tool / form of encrypted communication. |
Beta Was this translation helpful? Give feedback.
-
For a full more detailed security analysis, you can also have a look at our documented threat model: https://github.com/PrivateBin/PrivateBin/wiki/Threat-Model |
Beta Was this translation helpful? Give feedback.
-
Describe the problem/question
Hi there,
Can someone try all kinds of combination of letters as the URL to open every possible PrivateBin pastes?
My friend send me a long URL of PrivateBin privately, when I click the link it doesn't require a password to open it.
Is the content within safe? Technically only my friend and I have it but I assume anyone can "crawl" out a workable URL and get the content inside a working URL?
Did you use the FAQ section?
What you did?
...
What happens
No response
What should happen
No response
Additional information
No response
Server address
No response
Server OS
No response
Webserver
No response
PrivateBin version
No response
Browser and version
No response
Local operating system and version
No response
Issue reproducibility
No, I cannot reproduce it on https://privatebin.net.
Beta Was this translation helpful? Give feedback.
All reactions