16020
Comment: mention Mozilla Glean telemetry
|
16133
OpenTelemetry
|
Deletions are marked like this. | Additions are marked like this. |
Line 211: | Line 211: |
* [[https://opentelemetry.io/|OpenTelemetry]]: Client libraries in Debian: DebianPts:golang-opentelemetry-otel |
Contents
Documentation
Detection tools
Issue categories
logging & verbose logging
- homephoning without user consent
- cleartext
- TLS
- featurebug: when a bug is also a feature
- privacy defaults
- optin
- optout
- traceability
- no deletion of config files when uninstalling a package
- data leakage
- software names and version numbers
Reports
lintian privacy-breach tags: generic donation facebook google-adsense google-cse google-plus logo piwik statistics-website twitter uses-embedded-file w3c-valid-html
Privacy issues in Debian packages
Phone home
There are some common categories of phoning home:
These packages either don't fit those categories or do lots of them and more:
gnome-calculator - fetches currencies
Firefox - multiple issues
Chromium - phones home in various ways, e.g. 792580, binary blob downloads, site engagement profiles, Google login tied-in with the browser
syncthing - data transfer volume, unique ID submission, version check and lots more, public data report
cura - phones home in various ways, patched out in Debian.
- azure-cli - collects "anonymous" telemetry by default
glances - connects to several online services to discover public IP 850258
Phone elsewhere
Connectivity
Some services need to know when system is "online". Best practice is to only rely on system services, optionally coupled with distro-specific public service like network-manager-config-connectivity-debian . An antipattern is to hardcode probing of a public service.
Packages determining connectivity by probing Apple website and Google DNS resolvers:
Packages determining connectivity by probing Google DNS resolvers:
DNS
Many network protocols need a nameserver. Best practice is to only rely on user input or system resolver. An antipattern is to hardcode one or more nameservers, either exclusively or as internal default.
Packages using Cloudflare and Freenom and Google DNS resolvers by default:
Packages using Cloudflare and Google DNS resolvers by default:
systemd - see "FallbackDNS" in systemd-resolved manpage, 923081, patched in Debian
Packages using Cloudflare and Google and Qaud9 DNS resolvers by default:
Packages using Google DNS resolvers by default:
Packages using Google and UncensoredDNS DNS resolvers by default:
Packages using Google and 77.88.39.152 DNS resolvers by default:
ICE
WebRTC and SIP and similar protocols need a public-accessible TUN/STUN/TURN service across public networks. Best practice is to only rely on local configuration. an antipattern is to hardcode public STUN services, either exclusively or as internal default.
Packages using Ekiga STUN resolvers by default:
Packages using Ekiga and GNUnet and Mozilla STUN resolvers by default:
Packages using Ekiga and SIPgate and Stuntman and more STUN resolvers by default:
Packages using Ekiga and SIPphone and Google and Stuntman and Xten and more STUN resolvers by default:
Packages using Google STUN resolvers by default:
Packages using Google and Stuntman STUN resolvers by default:
Packages using SIPgate and SIPphone STUN resolvers by default:
Packages using SIPphone STUN resolvers by default:
Packages using Stuntman STUN resolvers by default:
Packages using Xten STUN resolvers by default:
Data sharing
- remmina - shares the clipboard with remote hosts over RDP by default
- pidgin - shares typing notifications with remote peers by default
- hw-probe - includes truncated salted hashes of MAC addresses and serial numbers in hardware probe reports
- git-remote-bzr (all implementations) - leaks the local git branch name into the "branch nick" field of commits, which could get pushed to a remote repository
Data leakage
- Lots of different software leaks software names and version numbers into output
DNS servers respond with it to this command: dig +short @f.root-servers.net version.bind chaos txt
- These DNS servers are definitely affected: unbound, bind
Mail user agents leak this into one of several headers: User-Agent Mailer X-Mailer
- These MUAs are definitely affected: evolution
Mail servers leak this into the Received header
- These MTAs are definitely affected: exim
Web browsers leak this into the User-Agent header
- Almost all HTTP clients do this by default
Data storage
- web and other servers of various kinds default to logging information about requests over the network from external entities
Telemetry libraries
Debian contains some telemetry client libraries and some packages depend or build-depend on them. The code calling these libraries may or may not be active by default, often API keys are required before data may be submitted.
Sentry: requires something called a DSN before the client libraries will send to the server. Server side is BSL licensed, Apache2 licensed after 36 months, so it is self-hostable. Client libraries in Debian: golang-github-getsentry-sentry-go golang-raven-go ruby-sentry-raven sentry-python node-raven-js
Glean: setting true as the value of the uploadEnabled parameter to the Glean initialize function enables uploading telemetry information.
OpenTelemetry: Client libraries in Debian: golang-opentelemetry-otel