← Back to context

Comment by lijok

21 hours ago

Huh? Hash your bucket names

if your bucket name is ever exposed and you later delete it, then this doesn't help you.

  • The entire article talks about “guessing” the bucket name as being the attack enabler, not the leaking of it. What does the landscape look like once you start doing the basics like hashing your bucket names? Is this still a problem worth engineering for?

I don't think that'd prevent this attack vector.

  • Ok; salt, and then hash your bucket names

    • that doesn't help either. 'Salt' is public and usually different/unique per entry/name.

      If you mean to use a "secret" prefix (i.e. pepper) then, that would generate effectively globally unique names each time (and unpredictable too) but you can't change the pepper and it's only a matter of time it'd leak.

      5 replies →