Return-Path: Delivered-To: apmail-couchdb-user-archive@www.apache.org Received: (qmail 25143 invoked from network); 12 Apr 2011 21:43:33 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 12 Apr 2011 21:43:33 -0000 Received: (qmail 8533 invoked by uid 500); 12 Apr 2011 21:43:32 -0000 Delivered-To: apmail-couchdb-user-archive@couchdb.apache.org Received: (qmail 8502 invoked by uid 500); 12 Apr 2011 21:43:32 -0000 Mailing-List: contact user-help@couchdb.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: user@couchdb.apache.org Delivered-To: mailing list user@couchdb.apache.org Received: (qmail 8492 invoked by uid 99); 12 Apr 2011 21:43:32 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 12 Apr 2011 21:43:32 +0000 X-ASF-Spam-Status: No, hits=-0.7 required=5.0 tests=FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of travis.jensen@gmail.com designates 209.85.216.52 as permitted sender) Received: from [209.85.216.52] (HELO mail-qw0-f52.google.com) (209.85.216.52) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 12 Apr 2011 21:43:24 +0000 Received: by qwb8 with SMTP id 8so11586qwb.11 for ; Tue, 12 Apr 2011 14:43:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:references:in-reply-to:from:date :message-id:subject:to:content-type:content-transfer-encoding; bh=FZraOmYch9GebUoWG7EjmTGwf+1sL++UMb/U3ijCtKY=; b=bkB24EQrknWI8ZXfvPa3oGH7BplYJKmQcD21DgzGAgTbpKMUgiKoPHcY/Ah4wyl928 FvRDLksuagAKiiA56GK0i+D1LEHxV1xkRT8h+f1Ktto/fS42bLOrljE1dmFNUy+S+RD2 PkGz1Gd95eZ+qqBYFO6If78zqHvT0zyn39mLo= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :content-type:content-transfer-encoding; b=pkGF9v38np8sj3m/UxtrD5bHcIOgWz1b438iToot0qRrrAJsFzqBm7hKFEhEtOdCde vBWk8LerliUa8EQRdGWBO5S46/K08nbYPhCaRe0BKwLNM9xbJItbFWOtCCuDC25wOjWN FOmnpz5+lqjPfbfdAs/aYZT2FDWCb6N1++4K4= Received: by 10.224.2.213 with SMTP id 21mr4201729qak.298.1302644583500; Tue, 12 Apr 2011 14:43:03 -0700 (PDT) Mime-Version: 1.0 (iPad Mail 8G4) References: <1383643868066120172@unknownmsgid> <3746963615976933497@unknownmsgid> In-Reply-To: From: Travis Jensen Date: Tue, 12 Apr 2011 15:42:48 -0600 Message-ID: <8307437816949766397@unknownmsgid> Subject: Re: Encrypting attachments To: "user@couchdb.apache.org" Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-Virus-Checked: Checked by ClamAV on apache.org My hope is to keep it self contained inside Couch. I am already extending the auth to handle custom authentication, so I'm not afraid to get into the code. :) JS encryption won't work because you can't get access to files getting posted. If I could do that, I certainly would, but my only option there (which I have investigated) is a plugin. I'm not completely tied to the idea of using couch's attachments, but it has a certain simplicity I am in favor of. I did just realize that this is probably more applicable to the dev list than here, though. - Travis Jensen On Apr 12, 2011, at 2:03 PM, Ryan Ramage wrote: > I think Benoit is talking about a middle layer. Like node.js or an app se= rver. > > If you are doing a thin couchapp style, then yes it's harder. You > could use a javascript encryption lib on the client. > > Although, I could see value of having it handled as a "couch plugin" > to the attachment system. > > > On Tue, Apr 12, 2011 at 1:51 PM, Travis Jensen = wrote: >> On Apr 12, 2011, at 11:41 AM, Benoit Chesneau wrot= e: >> >>> On Tue, Apr 12, 2011 at 7:33 PM, Travis Jensen wrote: >>>> If I wanted to encrypt all attachments, where would I go about hooking >>>> in to couch? I'm guessing I would have to replace the current >>>> attachment handler, right? >>>> >>>> I haven't started digging on this; I thought it might be useful to get >>>> some feedback first. >>>> >>>> Thanks >>>> >>>> Tj >>>> >>>> - >>>> Travis Jensen >>>> >>> >>> for better security I would encode them at the client level so the >>> server isn't aware of the decryption key or anything. >>> >>> - beno=EEt >> >> While I totally agree with you, it isn't really practical for >> web-based applications. >> >> Tj >> >> - >> Travis Jensen >>