| 7 | | Nathan Wilcox has discovered that the new web API in allmydata-tahoe |
| 8 | | version 0.5 is vulnerable to XSRF attack. An XSRF -- or "Cross-Site |
| 9 | | Reference Forgery" attack -- is one in which an attacker creates an |
| 10 | | innocuous-looking hyperlink, and if a user clicks on that hyperlink |
| 11 | | then it causes deletion or theft of the user's data. We are working |
| 12 | | on a fix for this problem, and in the meantime if you have stored any |
| 13 | | private or precious data on a tahoe grid, then you can make sure that |
| 14 | | you are not exposed to this threat by shutting down your tahoe node |
| 15 | | before browsing the web. |
| | 7 | This fixes a security flaw in Tahoe v0.5.0. |
| 17 | | You can read more about the attack and our fix in the mailing list archves: |
| 18 | | |
| 19 | | http://allmydata.org/pipermail/tahoe-dev/ |
| 20 | | |
| 21 | | and in this bug tracker ticket: |
| 22 | | |
| 23 | | http://allmydata.org/trac/tahoe/ticket/98 |
| 24 | | |
| 25 | | === 2007-08-17 -- Allmydata Tahoe v0.5 released! === |
| 26 | | |
| 27 | | This version adds a RESTful API allowing you to program your Tahoe node in the language of your choice, as well as a command-line API in the Unix style, and some performance improvements. |
| 28 | | |
| 29 | | Please see [source:relnotes.txt@1129 the Release Notes]. |
| | 9 | Please see [source:relnotes.txt@1154 the Release Notes]. |