-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[OpenID4VP] response encrypted #39
Comments
good catch, a security analysis is required on the encrypted vp_token response, why it is a requirement and how it could not be a requirement |
The argument for encryption I have heard in the context of an ISO profile of OpenID4VP for mdocs (23220-4) is "TLS is not sufficient because what if TLS ends at the peripheral of the verifier's system and response is pass unencrypted between multiple components within the verifier's system before it reaches target application that wants to consume mdoc/data". Which IMO is about verifier's internal system... |
While a proper security analysis still needs to be performed, I can add that the motivations provided within the “Why the response is encrypted?” note are not correct. Additionally, the note asserts that the SSL split could:
This is only possible if the device contains a malicious app running with root privileges that can access private memory regions of other apps.
As mentioned by @Sakurann, there exists a technique known as "TLS termination". It involves the use of a termination proxy which pretends to be the target webserver and manages any TLS-related operations. By doing so, the proxy deciphers the transmission's content and forwards it either in plaintext or by negotiating an internal TLS session with the actual webserver's intended target. In the first scenario, precautions must be taken because any malicious actor within the network segment could sniff the transmitted data and obtain sensitive information, such as the unencrypted response. |
@NetBender can you provide a pull request with the correct text to be added/changed in that note about the security considerations? It would be amazing having you in the formal contributors of this specs |
Closed by #72 |
Is there a security analysis done in our context? It seams to me that this is a security requirement but I think that it requires further investigations, unless you already have some documentation. In this case, share it please.
Originally posted by @fmarino-ipzs in #31 (comment)
The text was updated successfully, but these errors were encountered: