2022-05-05 17:51:33 +02:00
|
|
|
<!--
|
|
|
|
N.B.: This README was automatically generated by https://github.com/YunoHost/apps/tree/master/tools/README-generator
|
|
|
|
It shall NOT be edited by hand.
|
|
|
|
-->
|
|
|
|
|
2022-05-05 17:58:09 +02:00
|
|
|
# TrustyHash for YunoHost
|
2022-05-05 17:51:33 +02:00
|
|
|
|
2022-05-05 17:58:09 +02:00
|
|
|
[![Integration level](https://dash.yunohost.org/integration/TrustyHash.svg)](https://dash.yunohost.org/appci/app/TrustyHash) ![](https://ci-apps.yunohost.org/ci/badges/TrustyHash.status.svg) ![](https://ci-apps.yunohost.org/ci/badges/TrustyHash.maintain.svg)
|
|
|
|
[![Install TrustyHash with YunoHost](https://install-app.yunohost.org/install-with-yunohost.svg)](https://install-app.yunohost.org/?app=TrustyHash)
|
2022-05-05 17:51:33 +02:00
|
|
|
|
|
|
|
*[Lire ce readme en français.](./README_fr.md)*
|
|
|
|
|
2022-05-05 17:58:09 +02:00
|
|
|
> *This package allows you to install TrustyHash quickly and simply on a YunoHost server.
|
2022-05-05 17:51:33 +02:00
|
|
|
If you don't have YunoHost, please consult [the guide](https://yunohost.org/#/install) to learn how to install it.*
|
|
|
|
|
|
|
|
## Overview
|
|
|
|
|
2022-05-05 18:26:54 +02:00
|
|
|
# TrustyHash - A Trustable Hash Calculator
|
|
|
|
|
|
|
|
TrustyHash is a small [client-side](https://unhosted.org/) web application that
|
|
|
|
computes SHA-256 hash values on both local files and on remote URLs, with a
|
|
|
|
strong emphasis on a process that will allow you to trust the results. Works
|
|
|
|
offline!
|
|
|
|
|
|
|
|
TrustyHash homepage: https://github.com/sprin/TrustyHash
|
|
|
|
|
|
|
|
[Use it here](https://sprin.github.io/TrustyHash/)
|
|
|
|
|
|
|
|
## How is this useful?
|
|
|
|
|
|
|
|
Integrity: "We have in hand the same set of sequences of bits that came into
|
|
|
|
existence when the object was created" - [Lynch](http://www.clir.org/pubs/reports/pub92/lynch.html)
|
|
|
|
|
|
|
|
"Friends don't let friends use unverified downloads."
|
|
|
|
|
|
|
|
This fills a need for a verifiable, web-based hash calculator written in free
|
|
|
|
JavaScript. If you already use the command-line hash utilities on your
|
|
|
|
system, you should continue to use those. This is targeted towards users who do
|
|
|
|
not have or are unable to use the hash utilities on their local systems. While
|
|
|
|
universal command-line-literacy is a good goal, the concepts of file integrity and
|
|
|
|
authenticity and the ability to use tools for verification are perhaps more
|
|
|
|
fundamental.
|
|
|
|
|
|
|
|
Integrity is the first link in secure systems, and key to determining
|
|
|
|
authenticity. If we trust the association between an author and the hash value
|
|
|
|
of a file they created, perhaps because we trust them and they gave us the
|
|
|
|
hash in person, we can authenticate whether a file we believe to be the same
|
|
|
|
really did come from them. We can achieve the same result if the author had
|
|
|
|
used a signing key, and signed and distributed a hash value along with the
|
|
|
|
file, and we could trust the association between a particular key and the
|
|
|
|
author - albeit with somewhat more complexity and caveats (eg, has the signing
|
|
|
|
key been kept private?).
|
|
|
|
|
|
|
|
In a few words, this tool aims to enable verification of integrity and
|
|
|
|
authenticity claims in an accessible way that depends only on a trusted hash
|
|
|
|
value and the correctness and integrity of the TrustyHash app and the browser
|
|
|
|
it executes in. See the section "Trust" below for recommendations on
|
|
|
|
how to verify integrity of this application.
|
|
|
|
|
|
|
|
## Usage
|
|
|
|
|
|
|
|
Local files can be opened from a file select dialog, or dragged into the "drop
|
|
|
|
area". Remote URLs can be entered, and if the remote server allows cross-origin
|
|
|
|
GET requests via
|
|
|
|
[CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/Access_control_CORS),
|
|
|
|
the file will be downloaded to the browser, with the option of saving locally.
|
|
|
|
|
|
|
|
It's recommended to save the application, verify the integrity, and use the
|
|
|
|
saved copy from then on. To save from the browser, use "Save Page" > "Web Page,
|
|
|
|
HTML Only", and use a filename of `TrustyHash.html`. To verify, read the
|
|
|
|
section on "Trust" below.
|
2022-05-05 17:51:33 +02:00
|
|
|
|
|
|
|
|
2022-05-05 17:51:35 +02:00
|
|
|
**Shipped version:** 1.0~ynh1
|
2022-05-05 17:51:33 +02:00
|
|
|
|
2022-05-05 17:58:09 +02:00
|
|
|
**Demo:** https://sprin.github.io/TrustyHash/
|
2022-05-05 17:51:33 +02:00
|
|
|
|
2022-05-05 17:51:35 +02:00
|
|
|
## Screenshots
|
2022-05-05 17:51:33 +02:00
|
|
|
|
2022-05-05 17:51:35 +02:00
|
|
|
![](./doc/screenshots/example.jpg)
|
2022-05-05 17:51:33 +02:00
|
|
|
|
|
|
|
## Disclaimers / important information
|
|
|
|
|
2022-05-05 18:28:10 +02:00
|
|
|
## Trust
|
|
|
|
|
|
|
|
This app does the hash calculation in the browser using the
|
|
|
|
[WebCryptoAPI](https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/digest).
|
|
|
|
This means we can trust the hash calculation under the following assumptions:
|
|
|
|
|
|
|
|
- The integrity of the application has been preserved when it executes in the
|
|
|
|
browser.
|
|
|
|
- The browser and any extensions can be trusted.
|
|
|
|
|
|
|
|
### Integrity of the TrustyHash itself
|
|
|
|
|
|
|
|
Because the application itself is a single HTML file which can be saved locally,
|
|
|
|
there are various means for verifying integrity.
|
|
|
|
|
|
|
|
#### Trusted Hash Utility
|
|
|
|
|
|
|
|
The most reliable way to verify is to compute the hash of the HTML file with a
|
|
|
|
trusted hash utility on the local system, and compare against the values
|
|
|
|
published below.
|
|
|
|
|
|
|
|
#### Code Audit
|
|
|
|
|
|
|
|
Someone familiar with JavaScript can spend a few minutes reading the concise
|
|
|
|
source to be assured that the program does what it claims to.
|
|
|
|
|
|
|
|
#### No Hash Utility, Can't Audit Code?
|
|
|
|
|
|
|
|
Hmm, no trusted hash utility, can't audit the code... you just can't give up
|
|
|
|
and use your copy of TrustyHash without trusting it! While you could try some
|
|
|
|
half-measure like getting some kind of consensus on the hash value of
|
|
|
|
TrustyHash from untrusted hash utilities on the web, maybe other copies of
|
|
|
|
TrustyHash found elsewhere... ultimately if you really need to trust
|
|
|
|
TrustyHash, you've got to be a bit more rigorous.
|
|
|
|
|
|
|
|
Without knowing a thing about JavaScript until this moment, you can create a
|
|
|
|
very small, simple program in about 5 minutes, that while not as nice as
|
|
|
|
TrustyHash perhaps, will get the job of hashing a local file done. As long as
|
|
|
|
you can follow along as the following code is explained, and you can be pretty
|
|
|
|
confident the code is not doing anything fishy, you can use this to verify
|
|
|
|
TrustyHash itself. I'll show you the whole program up-front before I explain
|
|
|
|
it - see, 5 minutes, no more!
|
|
|
|
|
|
|
|
```
|
|
|
|
<!doctype html>
|
|
|
|
<html>
|
|
|
|
<body>
|
|
|
|
<script>
|
|
|
|
var fileinput = document.createElement('input')
|
|
|
|
fileinput.type = 'file'
|
|
|
|
fileinput.onchange = function(){
|
|
|
|
var reader = new FileReader()
|
|
|
|
reader.readAsArrayBuffer(this.files[0]);
|
|
|
|
reader.onload = function(){
|
|
|
|
crypto.subtle.digest("SHA-256", this.result)
|
|
|
|
.then(function(buffer) {
|
|
|
|
var hexCodes = []
|
|
|
|
var view = new DataView(buffer)
|
|
|
|
for (var i = 0; i < view.byteLength; i += 1) {
|
|
|
|
var stringValue = view.getUint8(i).toString(16)
|
|
|
|
var paddedValue = ('0' + stringValue).slice(-2)
|
|
|
|
hexCodes.push(paddedValue)}
|
|
|
|
alert(hexCodes.join(""))})}}
|
|
|
|
document.body.appendChild(fileinput)
|
|
|
|
</script>
|
|
|
|
</body>
|
|
|
|
</html>
|
|
|
|
```
|
|
|
|
|
|
|
|
JavaScript programmers may take offense with the lack of conventional
|
|
|
|
formatting above, but I'm trying to making this easy to re-type for someone who
|
|
|
|
shouldn't need to be concerned with formatting conventions.
|
|
|
|
|
|
|
|
Now a more-or-less line-by-line explanation:
|
|
|
|
|
|
|
|
```
|
|
|
|
<!doctype html>
|
|
|
|
<html>
|
|
|
|
<body>
|
|
|
|
<input type="file">
|
|
|
|
<script>
|
|
|
|
```
|
|
|
|
|
|
|
|
These lines declare an HTML document with a file input and a script. HTML
|
|
|
|
technically requires a `<head>` element, but I'm trying to save you a bit of
|
|
|
|
typing. Now let's get into the JavaScript itself:
|
|
|
|
|
|
|
|
```
|
|
|
|
document.querySelector('input').onchange = function(){
|
|
|
|
```
|
|
|
|
|
|
|
|
This says, when a file is selected via the file input...
|
|
|
|
|
|
|
|
```
|
|
|
|
var reader = new FileReader()
|
|
|
|
```
|
|
|
|
|
|
|
|
...create a reader to read the file.
|
|
|
|
|
|
|
|
```
|
|
|
|
reader.readAsArrayBuffer(this.files[0])
|
|
|
|
```
|
|
|
|
|
|
|
|
Read the file into memory.
|
|
|
|
|
|
|
|
```
|
|
|
|
reader.onload = function(){
|
|
|
|
```
|
|
|
|
|
|
|
|
When the reader finishes...
|
|
|
|
|
|
|
|
```
|
|
|
|
crypto.subtle.digest("SHA-256", this.result)
|
|
|
|
```
|
|
|
|
|
|
|
|
Hash the buffer with SHA-256.
|
|
|
|
|
|
|
|
```
|
|
|
|
.then(function(buffer) {
|
|
|
|
```
|
|
|
|
|
|
|
|
When hashing finishes, we have an unprintable object, called a buffer...
|
|
|
|
|
|
|
|
```
|
|
|
|
var hexCodes = []
|
|
|
|
```
|
|
|
|
|
|
|
|
...that we want to turn in to printable hex codes, which is just a way to
|
|
|
|
represent a number using only the characters 0 to 9 and 'a' to 'f'. Hex codes
|
|
|
|
are the standard representation of SHA-256 hash values.
|
|
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
var view = new DataView(buffer)
|
|
|
|
```
|
|
|
|
|
|
|
|
We create a view so we can read the buffer in chunks.
|
|
|
|
|
|
|
|
```
|
|
|
|
for (var i = 0; i < view.byteLength; i += 1) {
|
|
|
|
```
|
|
|
|
|
|
|
|
With each byte-size chunk...
|
|
|
|
|
|
|
|
```
|
|
|
|
var stringValue = view.getUint8(i).toString(16)
|
|
|
|
```
|
|
|
|
|
|
|
|
...convert each chunk to a number and get a string, which is just something we
|
|
|
|
can print. The string will be one or two hex digits.
|
|
|
|
|
|
|
|
```
|
|
|
|
var paddedValue = ('0' + stringValue).slice(-2)
|
|
|
|
```
|
|
|
|
|
|
|
|
To correctly print the string as a hex code, we need to add a zero to the front
|
|
|
|
in case the number is less than two hex digits, keeping the last two digits.
|
|
|
|
|
|
|
|
```
|
|
|
|
hexCodes.push(paddedValue)}
|
|
|
|
```
|
|
|
|
|
|
|
|
Keep the string we just created before moving on to the next chunk.
|
|
|
|
|
|
|
|
```
|
|
|
|
alert(hexCodes.join(""))})}}
|
|
|
|
```
|
|
|
|
|
|
|
|
Join all the strings created from each chunk together and pop it up on the
|
|
|
|
screen. That's it!
|
|
|
|
|
|
|
|
```
|
|
|
|
</script>
|
|
|
|
</body>
|
|
|
|
</html>
|
|
|
|
```
|
|
|
|
|
|
|
|
Oh, and we need these lines to formally close the HTML document.
|
|
|
|
|
|
|
|
If you followed all that, put this code into a file called
|
|
|
|
`TrustyHashLite.html` and open it up in your browser. I recommend re-typing,
|
|
|
|
rather than copy-pasting, since there are a bunch of sneaky ways someone could
|
|
|
|
trick you into copy-pasting something besides what you see on a web page. If
|
|
|
|
creating HTML files by hand is a bit confusing, you can save [the file I
|
|
|
|
created for
|
|
|
|
you](https://raw.githubusercontent.com/sprin/TrustyHash/master/TrustyHashLite.html)
|
|
|
|
as long as you promise you will make sure the code matches the above after you
|
|
|
|
have saved it. One way to do this is to open the file in a browser, right-click
|
|
|
|
and select "View Page Source".
|
|
|
|
|
|
|
|
Open the `TrustyHashLite.html` file in your browser, click the file input
|
|
|
|
button, select the `TrustyHash.html` you saved earlier. If the printed hex code
|
|
|
|
matches the published hash values, congratulations, you just wrote a program
|
|
|
|
that computes SHA-256 hashes *and* used it to validate TrustyHash!
|
|
|
|
|
|
|
|
### Hash Values
|
|
|
|
|
|
|
|
TODO: Publish hash value for 1.0.0
|
|
|
|
|
|
|
|
### Integrity of the Browser
|
|
|
|
|
|
|
|
In order to trust the results of TrustyHash, we need to trust the browser that
|
|
|
|
it runs in. Is the implementation of WebCryptoAPI to be trusted? Are extensions
|
|
|
|
able to modify the result the user sees?
|
|
|
|
|
|
|
|
If one is able to see the source of the browser and deterministic, reproducible
|
|
|
|
builds are possible, then we can start to form a strong basis of trust. Closed
|
|
|
|
source browsers must be excluded - the vendor is not able to assert a strong
|
|
|
|
claim of *what* they are distributing. At best, they may be able to publish
|
|
|
|
complete specifications for all functionality, but users still must trust the
|
|
|
|
vendor ultimately to actually implement the specifications as claimed. The
|
|
|
|
point is moot since no closed-source browser vendor publishes complete
|
|
|
|
specifications anyway.
|
|
|
|
|
|
|
|
Currently, open-source browsers are little better off. Deterministic builds are
|
|
|
|
still a work-in-progress for all popular open-source browsers
|
|
|
|
([Tor Browser](https://blog.torproject.org/category/tags/deterministic-builds),
|
|
|
|
[Firefox](https://bugzilla.mozilla.org/show_bug.cgi?id=885777),
|
|
|
|
[Chromium](https://bugs.chromium.org/p/chromium/issues/detail?id=314403).
|
|
|
|
Without deterministic builds, we must still trust the vendor ultimately to
|
|
|
|
build and distribute what they say they are building. If we trust the vendor
|
|
|
|
when they say, "deterministic builds are hard, we are working on it", and we
|
|
|
|
can trust them to secure their build environment, then we can take the signed
|
|
|
|
hash values they publish to represent the objects built from the published
|
|
|
|
sources.
|
|
|
|
|
|
|
|
So then there are three realistic ways we might have a trusted browser on our
|
|
|
|
systems:
|
|
|
|
|
|
|
|
- A verified open-source browser was bundled with our trusted operating system
|
|
|
|
distro.
|
|
|
|
- We installed an open-source browser from a trusted package manager that
|
|
|
|
handled checking verification for us.
|
|
|
|
- We downloaded the open-source browser directly from the vendor and checked
|
|
|
|
the signatures/hashes ourselves.
|
|
|
|
|
|
|
|
The third possible way, which is only feasible for a tiny fraction of extremely
|
|
|
|
diligent users, is to build the browser from source, rebuilding whenever
|
|
|
|
security updates are pushed to users.
|
|
|
|
|
|
|
|
Since the majority of browser users do not use an operating system that bundles
|
|
|
|
a verified open-source browser nor supplies a package manager which can
|
|
|
|
download and verify an open-source browser for them, this leaves manually
|
|
|
|
verifying. Because no operating system makes it easy or obvious to verify
|
|
|
|
signed downloads and awareness of the importance of verification is very low,
|
|
|
|
we have to conclude that the majority of browser users have very little basis
|
|
|
|
for trusting their browser. Similar arguments can be made for the operating
|
|
|
|
system as a whole.
|
|
|
|
|
|
|
|
So where does that leave us? Is running any program inside a browser with any
|
|
|
|
degre of trust hopeless for the vast majority of users? I would say that we may
|
|
|
|
be forced to accept some uncertainty that a program such as TrustyHash will
|
|
|
|
produce the correct results in an untrusted browser. If we accept this
|
|
|
|
uncertainty, we can use TrustyHash to bootstrap trust for a new browser or even
|
|
|
|
operating system. This, I think, is the real value of TrustyHash - to bootstrap
|
|
|
|
trust on a system by providing the best possible effort at producing trusted
|
|
|
|
hash values in an accessible way.
|
|
|
|
|
|
|
|
## Deployment
|
|
|
|
|
|
|
|
The entire application is packaged in a single, brief HTML file. Simply deploy
|
|
|
|
the file under the web server root directory.
|
|
|
|
|
|
|
|
## Why only SHA-256?
|
|
|
|
|
|
|
|
SHA-256 remains the de facto standard for verifying files via hash in 2016.
|
|
|
|
Here are some popular projects have standardized on SHA-256 for verifying
|
|
|
|
release materials:
|
|
|
|
|
|
|
|
- [Tor Browser](https://www.torproject.org/docs/verifying-signatures.html#BuildVerification)
|
|
|
|
- [OpenBSD](http://man.openbsd.org/signify)
|
|
|
|
- [FreeBSD](https://www.freebsd.org/releases/10.2R/signatures.html)
|
|
|
|
- [Centos](http://mirror.centos.org/centos/7/isos/x86_64/sha256sum.txt)
|
|
|
|
- [Fedora](https://getfedora.org/verify)
|
|
|
|
|
|
|
|
In the interests of standardization and keeping things simple, only SHA-256
|
|
|
|
will be shown. A possible addition to this project is to allow the user to
|
|
|
|
select other hash algorithms, with SHA-256 remaining the default.
|
|
|
|
|
|
|
|
## Limitations
|
|
|
|
|
|
|
|
When the application is retrieved on an HTTPS connection, the application
|
|
|
|
cannot fetch HTTP URLs due to restrictions against [mixed active
|
|
|
|
content](https://developer.mozilla.org/en-US/docs/Security/Mixed_content#Mixed_active_content]).
|
|
|
|
A workaround for this is to save the page locally and open the local copy in
|
|
|
|
the browser, as recommended anyway.
|
2022-05-05 17:51:33 +02:00
|
|
|
|
|
|
|
## Documentation and resources
|
|
|
|
|
2022-05-05 17:58:09 +02:00
|
|
|
* Official app website: https://github.com/sprin/TrustyHash
|
|
|
|
* Official user documentation: https://github.com/sprin/TrustyHash
|
|
|
|
* Upstream app code repository: https://github.com/sprin/TrustyHash
|
|
|
|
* YunoHost documentation for this app: https://yunohost.org/app_TrustyHash
|
|
|
|
* Report a bug: https://github.com/YunoHost-Apps/TrustyHash_ynh/issues
|
2022-05-05 17:51:33 +02:00
|
|
|
|
|
|
|
## Developer info
|
|
|
|
|
2022-05-05 17:58:09 +02:00
|
|
|
Please send your pull request to the [testing branch](https://github.com/YunoHost-Apps/TrustyHash_ynh/tree/testing).
|
2022-05-05 17:51:33 +02:00
|
|
|
|
|
|
|
To try the testing branch, please proceed like that.
|
|
|
|
```
|
2022-05-05 17:58:09 +02:00
|
|
|
sudo yunohost app install https://github.com/YunoHost-Apps/TrustyHash_ynh/tree/testing --debug
|
2022-05-05 17:51:33 +02:00
|
|
|
or
|
2022-05-05 17:58:09 +02:00
|
|
|
sudo yunohost app upgrade TrustyHash -u https://github.com/YunoHost-Apps/TrustyHash_ynh/tree/testing --debug
|
2022-05-05 17:51:33 +02:00
|
|
|
```
|
|
|
|
|
2022-05-05 17:51:35 +02:00
|
|
|
**More info regarding app packaging:** https://yunohost.org/packaging_apps
|