-
-
Notifications
You must be signed in to change notification settings - Fork 684
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Crypto: define mechansism status #2573
base: master
Are you sure you want to change the base?
Conversation
659a559
to
a37bb7d
Compare
I am highlighting here some changes I made along the way:
|
a37bb7d
to
e9cd3f5
Compare
@danielcuthbert @unprovable do you have any thoughts on the suggestions from @randomstuff ? |
Sure, some thoughts:
Hope this helps! M. |
I'm with @unprovable here. The use of MD5 and SHA1 for verification purposes only and I really stress this, VERIFICATION ONLY, is required for many orgs that still use this. I can think of many in ICS/CNI/Financial who do use MD5 in this way and want to be Level 2 and above. |
Isn't it weird to allow MD5 for verification in general? Isn't it too broken for that? Should we mention at the top of this appendix that this appendix defines a default standard set of allowed mechanisms and that this might be overloaded in the context of a given project:
|
I think it's good that they can't be ASVS certified. They should stop using md5. I don't think, with respect my friends, that this is a good reason to support out of date crypto.
For the legacy section only, and not in core requirements, I think is ok.
Agreed. Depending on what it's used for (key generation vs password storage) these numbers are usually different per use. |
Yes, that was my thinking as well. As an counter-example, maybe
Isn't “we don't generate new MD5s (or other broken hash function) hashes but still accept them for verification” dubious/dangerous? If you accept old broken hashes, it won't stop an attacker from generating new ones. Isn't your verification mostly useless? (In the general case. It probably depends based on the way hash is used i.e. it's probably not as bad for password hashing than for MAC or signature verification?) |
f734b69
to
424eef9
Compare
Do we? I had the understanding that HMAC-SHA-1 (and therefore PBKDF2-HMAC-SHA-1) was still considered not-broken in contrast to plain SHA-1 (eg. as used in digital signatures). |
424eef9
to
e1f6074
Compare
This PR is not intended to be merged for now. It is proof-of-concept for allowed/legacy/disallowed status of cryptographic mechanisms (#2398) and is intended to serve as a reference for discussing this option and a possible presentation style. The exact content would need to be verified/adjusted.