-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client send salt along with the registration #180
Comments
Is crypto/Rand library [https://golang.org/pkg/crypto/rand/] secure enough for salt implementation? |
We currently use Go's crypto/rand package for salt generation (see https://github.com/coniks-sys/coniks-go/blob/master/crypto/util.go#L61), so it should be fine to continue using crypto/rand to generate a salt on the client side. |
Where should client store salt? |
Sorry for the late response. As you mentioned in your email, we could store the salt (and other things) in a json-encoded file. OTOH, as we discussed in #193 (comment), we'll eventually do some sort of abstract API for persistent storage. |
Fine, so It will goes like this (in simple terms): It means there are required changes to client, protocol, server, pam, merkletree, and util folders. |
During our last meeting, we discussed how should the server/the client compute the commitment:
Main concern: server is using a static salt which would allow an attacker to test whether keys exist in the tree
=> client sends salt along with the registration
=> need secure PRNG
How to ensure the server is using the right commitment scheme? Client should verify with the scheme specified in the STR policy.
The text was updated successfully, but these errors were encountered: