Hacker News new | past | comments | ask | show | jobs | submit login

And there was a redaction system, which did not redact the key ("race condition"). Then a detection system, which didn't detect the key. And then the key was used to access an entirely different system with an entirely different access level and it just worked anyway.

The phrasing as "some obscure bugs were carefully exploited" seems a bit off, it looks more like a comedy of errors where none of the security systems served its purpose at all.




That's because the whole idea of a redaction system is stupid.

You can't start out with something unconstrained and expect to patch all the holes in it. Mathematically speaking, you start with set A which is all possibilities and set B which is all the things you know to remove and you end up with A \ B not {}.

You have to start out with something constrained and allow only the good bits through the holes.

Having a similar discussion at the moment. Which is the correct solution:

a) Buy some software to redact all PII from logs

b) don't put it in there in the first place


I agree in general, but for "signing key material", there should be enough entropy and they have enough control over the format to make it very easy to detect.

Plus, they are the ones who put the security of their system behind this detection, letting developers access the dump they believed to be redacted. Whether they made a massive mistake at the design or implementation phase doesn't really absolve them.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: