= Known Issues =
+1. Overview
+2. Issues in Tahoe-LAFS v1.6.0, released 2010-02-01
+ 2.1. Potential unauthorized access by JavaScript in unrelated files
+ 2.1.1. How to manage it
+ 2.2. Potential disclosure of file through embedded hyperlinks or JavaScript in that file
+ 2.2.1. How to manage it
+ 2.3. Command-line arguments are leaked to other local users
+ 2.3.1. How to manage it
+ 2.4. Capabilities may be leaked to web browser phishing filter servers
+ 2.4.1. How to manage it
+
+== Overview ==
+
Below is a list of known issues in recent releases of Tahoe-LAFS, and how to
manage them. The current version of this file can be found at
http://allmydata.org/source/tahoe/trunk/docs/historical/historical_known_issues.txt
-== issues in Tahoe-LAFS v1.6.0, released 2010-02-01 ==
+== Issues in Tahoe-LAFS v1.6.0, released 2010-02-01 ==
-=== potential unauthorized access by JavaScript in unrelated files ===
+=== Potential unauthorized access by JavaScript in unrelated files ===
If you view a file stored in Tahoe-LAFS through a web user interface,
JavaScript embedded in that file might be able to access other files or
have the ability to modify the contents of those files or directories,
then that script could modify or delete those files or directories.
-==== how to manage it ====
+==== How to manage it ====
For future versions of Tahoe-LAFS, we are considering ways to close off
this leakage of authority while preserving ease of use -- the discussion
malicious JavaScript.
-=== potential disclosure of file through embedded
-hyperlinks or JavaScript in that file ===
+=== Potential disclosure of file through embedded hyperlinks or JavaScript in that file ===
If there is a file stored on a Tahoe-LAFS storage grid, and that file
gets downloaded and displayed in a web browser, then JavaScript or
browsers, so being careful which hyperlinks you click on is not
sufficient to prevent this from happening.
-==== how to manage it ====
+==== How to manage it ====
For future versions of Tahoe-LAFS, we are considering ways to close off
this leakage of authority while preserving ease of use -- the discussion
written to maliciously leak access.
-=== command-line arguments are leaked to other local users ===
+=== Command-line arguments are leaked to other local users ===
Remember that command-line arguments are visible to other users (through
the 'ps' command, or the windows Process Explorer tool), so if you are
arguments. This includes directory caps that you set up with the "tahoe
add-alias" command. Use "tahoe create-alias" for that purpose instead.
-==== how to manage it ====
+==== How to manage it ====
Bypass add-alias and edit the NODEDIR/private/aliases file directly, by
adding a line like this:
there is a "tahoe create-alias" command that does this for you.
-=== capabilities may be leaked to web browser phishing filter servers ===
+=== Capabilities may be leaked to web browser phishing filter servers ===
Internet Explorer includes a "phishing filter", which is turned on by
default, and which sends any URLs that it deems suspicious to a central
default). Firefox briefly included a phishing filter in previous versions,
but abandoned it.
-==== how to manage it ====
+==== How to manage it ====
If you use Internet Explorer's phishing filter or a similar add-on
for another browser, consider either disabling it, or not using the WUI