foone,
@foone@digipres.club avatar

It'd be unlikely to have much use outside the one specific situation I find myself in, but it'd be interesting to have a variant on a one-click hoster that works by setting up a temporary one-off SFTP account. Like, you sign up to provide a file named X, and you can securely upload a thing and it gets stored in a server, which won't let you download X back.
Someone else creates an account to download the same-named file, and it gives them a similar temporary SFTP account

StompyRobot,
@StompyRobot@mastodon.gamedev.place avatar

@foone
Do you wipe the file after a partial transfer has been aborted?

ima,

@foone croc?

foone,
@foone@digipres.club avatar

the key would be that neither you nor they have to share anything outside of the filename: and it only allows one signup to be the receiving account

foone,
@foone@digipres.club avatar

so the username/password you're given is one use only, the whole thing is fully encrypted the entire upload and download, and for someone else to MITM it, they'd either need to control the server, or spy on your conversation and sign up to receive it before the intended recipient could

foone,
@foone@digipres.club avatar

and since only one person can sign up to get the file, this MITM would be obvious: the intended recipient would go "hey wait I can't sign up because someone else got it"

darkling,
@darkling@mstdn.social avatar

@foone Oddly enough, this is something that we've had exactly the need for at work recently. We've sort of shuffled around it without implementing all of what you just described for now, but you nailed our requirements.

makdaam,
@makdaam@chaos.social avatar

@foone So something like https://github.com/onetimesecret/onetimesecret but also for files?

foone,
@foone@digipres.club avatar

@makdaam yeah!

rumorsmatrix,

@foone not a 100% match but https://wormhole.app fits pretty closely!

trurl,
@trurl@mastodon.sdf.org avatar

@foone can the downloader retry if they disconnect before it finishes?

Wish I had an afternoon to hack this together.

Sender: ssh -i upload.key service@host file <somefile
(server: stash file)
Receiver: ssh -i claim.key service@host file >download.key
(server: move file, generate a keypair, update authorized_keys, print private key to stdout)
Receiver: scp -i download.key service@host:file .
(??? need to reap file when done)

Horribly insecure idea but fun to imagine trying.

gnomon,
@gnomon@mastodon.social avatar

@foone uggggh you're describing GXS (now OpenText)'s "trading grid", https://www.opentext.com/products/trading-grid-messaging-service , which is basically an access control list database in the middle, some replicated disk storage lumped up around it, and a bunch of FTP and web portals duck taped to the lumps. It's used by financial companies that don't trust each other but do trust GXS to send "CSV" (mostly actually twisted BAIv2) files to each other that represent transactions. It's terrible and the whole baking world runs on it.

BenAveling,
@BenAveling@mastodon.au avatar

@foone question though. If the conversation is MITM’d, then the imposter can tell the receiver a different file name?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • DreamBathrooms
  • ngwrru68w68
  • modclub
  • magazineikmin
  • thenastyranch
  • rosin
  • khanakhh
  • InstantRegret
  • Youngstown
  • slotface
  • Durango
  • kavyap
  • mdbf
  • GTA5RPClips
  • provamag3
  • ethstaker
  • normalnudes
  • tester
  • osvaldo12
  • everett
  • cubers
  • tacticalgear
  • anitta
  • megavids
  • Leos
  • cisconetworking
  • JUstTest
  • lostlight
  • All magazines