-
-
Notifications
You must be signed in to change notification settings - Fork 680
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Crypto: define mechansism status #2573
base: master
Are you sure you want to change the base?
Conversation
659a559
to
a37bb7d
Compare
I am highlighting here some changes I made along the way:
|
a37bb7d
to
e9cd3f5
Compare
@danielcuthbert @unprovable do you have any thoughts on the suggestions from @randomstuff ? |
Sure, some thoughts:
Hope this helps! M. |
I'm with @unprovable here. The use of MD5 and SHA1 for verification purposes only and I really stress this, VERIFICATION ONLY, is required for many orgs that still use this. I can think of many in ICS/CNI/Financial who do use MD5 in this way and want to be Level 2 and above. |
Isn't it weird to allow MD5 for verification in general? Isn't it too broken for that? Should we mention at the top of this appendix that this appendix defines a default standard set of allowed mechanisms and that this might be overloaded in the context of a given project:
|
I think it's good that they can't be ASVS certified. They should stop using md5. I don't think, with respect my friends, that this is a good reason to support out of date crypto.
For the legacy section only, and not in core requirements, I think is ok.
Agreed. Depending on what it's used for (key generation vs password storage) these numbers are usually different per use. |
Yes, that was my thinking as well. As an counter-example, maybe
Isn't “we don't generate new MD5s (or other broken hash function) hashes but still accept them for verification” dubious/dangerous? If you accept old broken hashes, it won't stop an attacker from generating new ones. Isn't your verification is mostly useless? (In the general case. It probably depends based on the way hash is used i.e. it's probably not as bad for password hashing than for MAC or signature verification?) |
This PR is not intended to be merged for now. It is proof-of-concept for allowed/legacy/disallowed status of cryptographic mechanisms (#2398) and is intended to serve as a reference for discussing this option and a possible presentation style. The exact content would need to be verified/adjusted.