You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Take the token returned in the response and append to URL. Note that we are intentionally ignoring the search_after or next response elements and instead crafting the next URL manually, against the documented recommendation.
Note the first bundle returned in the response: 3fb8b36e-0d8d-444b-922b-1dc877237c9a, version 2018-12-06T040402.751201Z. Requesting that bundle version from the DSS yields a 404.
Granted, this is a rather uncooperative usage pattern of the DSS REST API but no matter how uncooperative the client is, or even malicious, the DSS should prevent being tricked into revealing tombstoned bundles.
I think an easy fix would be to require that the search_after and token parameters are both present, or better, combine them into a single request parameter. I see no reason why search_after couldn't be stuffed into the token. Consider the case of an malicious client that passes both but stuffs manipulated values into them. I have the feeling that I could manipulate the DSS into all sorts of interesting things by manipulating the search_after and token values. Also note that base64 encoding the token does not protect it from being reverse engineered.
The text was updated successfully, but these errors were encountered:
Request the first page of a prefix that contains tombstoned bundles
Take the token returned in the response and append to URL. Note that we are intentionally ignoring the
search_after
ornext
response elements and instead crafting the next URL manually, against the documented recommendation.Note the first bundle returned in the response:
3fb8b36e-0d8d-444b-922b-1dc877237c9a
, version2018-12-06T040402.751201Z
. Requesting that bundle version from the DSS yields a 404.And indeed, that bundle version is tombstoned:
We stumbled over this by accident when researching the cause for DataBiosphere/azul#1488.
Granted, this is a rather uncooperative usage pattern of the DSS REST API but no matter how uncooperative the client is, or even malicious, the DSS should prevent being tricked into revealing tombstoned bundles.
I think an easy fix would be to require that the
search_after
andtoken
parameters are both present, or better, combine them into a single request parameter. I see no reason whysearch_after
couldn't be stuffed into the token. Consider the case of an malicious client that passes both but stuffs manipulated values into them. I have the feeling that I could manipulate the DSS into all sorts of interesting things by manipulating thesearch_after
andtoken
values. Also note that base64 encoding the token does not protect it from being reverse engineered.The text was updated successfully, but these errors were encountered: