On Fri, Jun 02, 2017 at 09:27:16PM +0200, Hendrik Leppkes wrote:
> On Fri, Jun 2, 2017 at 9:19 PM, Michael Niedermayer
> <mich...@niedermayer.cc> wrote:
> > This reduces the attack surface of local file-system and local network
> > information leaking.
> >
> > It prevents the existing exploit leading to an information leak. As
> > well as similar hypothetical attacks.
> >
> > Leaks of information from files and symlinks ending in common multimedia 
> > extensions
> > are still possible. But files with sensitive information like private keys 
> > and passwords
> > generally do not use common multimedia filename extensions.
> >
> > The existing exploit depends on a specific decoder as well.
> > It does appear though that the exploit should be possible with any decoder.
> > The problem is that as long as sensitive information gets into the decoder,
> > the output of the decoder becomes sensitive as well.
> > The only obvious solution is to prevent access to sensitive information. Or 
> > to
> > disable hls or possibly some of its feature. More complex solutions like
> > checking the path to limit access to only subdirectories of the hls path may
> > work as an alternative. But such solutions are fragile and tricky to 
> > implement
> > portably and would not stop every possible attack nor would they work with 
> > all
> > valid hls files.
> >
> > Developers have expressed their dislike / objected to disabling hls by 
> > default as well
> > as disabling hls with local files. This here is a less robust but also lower
> > inconvenience solution.
> > It can be applied stand alone or together with other solutions.
> >
> 
> One of the most important things is that at the very least HLS keeps
> working out of the box without magic options for actual HTTP HLS
> streams, ie. their primary domain.
> One aspect of this is that HLS streams hosted by CDNs often don't have
> an actual extension, since they get generated by various dynamic URLs,
> and this would break that, so its not a good idea.

please provide an example that fails with the patch


> 
> No matter what security fixes get applied, if HLS basically stops
> working its basic functionality, then its going too far.
> 
> - Hendrik
> _______________________________________________
> ffmpeg-devel mailing list
> ffmpeg-devel@ffmpeg.org
> http://ffmpeg.org/mailman/listinfo/ffmpeg-devel

-- 
Michael     GnuPG fingerprint: 9FF2128B147EF6730BADF133611EC787040B0FAB

I do not agree with what you have to say, but I'll defend to the death your
right to say it. -- Voltaire

Attachment: signature.asc
Description: Digital signature

_______________________________________________
ffmpeg-devel mailing list
ffmpeg-devel@ffmpeg.org
http://ffmpeg.org/mailman/listinfo/ffmpeg-devel

Reply via email to