diff options
author | vg <vgm+dev@devys.org> | 2020-06-22 17:41:04 +0200 |
---|---|---|
committer | vg <vgm+dev@devys.org> | 2020-06-22 17:41:04 +0200 |
commit | b8b321c4d56f737b8b52f92cc611f0b4d348fc8f (patch) | |
tree | 4a98b574572b6bbac17a09681b3d1aa5989e27a9 | |
parent | 23d126fda90141d802b58d4fa4fa866a90f6b7ef (diff) | |
download | shareit-b8b321c4d56f737b8b52f92cc611f0b4d348fc8f.tar.gz shareit-b8b321c4d56f737b8b52f92cc611f0b4d348fc8f.tar.bz2 shareit-b8b321c4d56f737b8b52f92cc611f0b4d348fc8f.zip |
document limitations
-rw-r--r-- | readme.rst | 19 |
1 files changed, 19 insertions, 0 deletions
@@ -39,6 +39,25 @@ inside shareit directory: The service can be run as a python wsgi service. I tested it under uwsgi. +Limitations +=========== + +Hashes are currently md5 of the content of the file: + +- It is possible to change the file content but having its md5 unchanged. This + can be used to maliciously put a compromised file in place of the original + one. + +- It is possible to change the file name by just downloading the file, and + reuploading it with another name. + +Both risks can be mitigated by protecting upload side with a password in the +webserver configuration. + +It is possible to do better, but my instance has its upload side protected by +a password, thus I'm not in a hurry and I'm open to pull requests if you have +suggestions. + License ======= |