-
-
Notifications
You must be signed in to change notification settings - Fork 677
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cryptography - proposed requirement about MAC verification failure #2499
Comments
If we do add this in I suggest we just add the Caveat to the end of the requirement.
|
I leave this up to @danielcuthbert's judgement, I am not sure about this one. |
I think that the additions from Bart should have In any case, this is a very sound bit of advice, but is going to be mostly left to TLS, SSH, or whatever other libraries are in play. Both of those will reject connections if verification fails, so it's really a design pattern check for anything custom written by a developer. Perhaps you could make en/de-cryption occur with auth failing in something like JWT? I think this might need some further digging. |
When using JWT with encryption, the claims which might be useful for "routing" the JWT are expected to be included in the (plaintext) JWT header. So I don't think that this should be required. But actually JWT tends to uses MAC-or-sign-then-ecnrypt (when using encryption).
Note: they are talking about signature but actually intend to talk about both digital signatures and MAC (AFAIU). A MAC is verified before decryption of the JWE, however. I think it does help mitigate the issues we are intending to mitigate with 6.5.6. @danielcuthbert? |
Again @randomstuff, do you think this is general enough to include? It seems like another example of a requirement to use if you "roll your own crypto".... |
@tghosth, I agree that it is quite low-level and I am not sure we need to include that level of detail in ASVS (as opposed to "crypto security verification standard" 😄). |
Proposed requirement by Bart Preneel:
Might be difficult to verify / quite low-level.
Caveat: This is not compatible with MAC-then-encrypt as still used with some TLS 1.2 ciphersuites. (see #2498).
The text was updated successfully, but these errors were encountered: