Document security considerations #2

Open
opened 2016-11-07 18:33:02 +00:00 by geoff · 1 comment
geoff commented 2016-11-07 18:33:02 +00:00 (Migrated from code.uplex.de)

A general statement about security seems appropriate, in addition to some specific comments:

  • The VMOD implements HMAC with SHA3_*, but the "double hashing" isn't necessary, since SHA3 is not vulnerable to length extension attacks. It's sufficient to just concatenate the key with a message (initialize a digest object with the key in vcl_init).
  • MD5 and SHA1 are for legacy, and should not be used in new code.
  • CRC32 isn't crypto.
A general statement about security seems appropriate, in addition to some specific comments: * The VMOD implements HMAC with SHA3_*, but the "double hashing" isn't necessary, since SHA3 is not vulnerable to length extension attacks. It's sufficient to just concatenate the key with a message (initialize a digest object with the key in vcl_init). * MD5 and SHA1 are for legacy, and should not be used in new code. * CRC32 isn't crypto.
slink commented 2023-07-07 15:23:21 +00:00 (Migrated from code.uplex.de)

mentioned in commit 86a523ab10

mentioned in commit 86a523ab109a2cbcd0e2d32cbed5cad0ad0cc18e
Sign in to join this conversation.
No labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
uplex-varnish/libvmod-blobdigest#2
No description provided.