Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Checking for weak signatures #18

Merged
merged 1 commit into from
Mar 31, 2016

Conversation

Diagoras
Copy link
Contributor

No description provided.

@slawekjaranowski
Copy link
Member

Fix: #11

@slawekjaranowski slawekjaranowski merged commit 9c7b1e4 into s4u:master Mar 31, 2016
@slawekjaranowski slawekjaranowski added this to the v1.2.0 milestone Mar 31, 2016
.put(5, "MD2")
.put(6, "TIGER_192")
.put(7, "HAVAL_5_160")
.put(11, "SHA224")

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it intended that SHA-224 is considered weak but not SHA-1?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, although I know it's weird. My reasoning is that SHA-1 is so commonly used that marking it as weak at this point would flood developers with warning/error messages, even though it's strictly weaker than SHA-224. Essentially the same reasoning used by the developer of OpenKeychain when they built their list of allowed signature algorithms.

I originally checked the security of the underlying public key as well, but the same problem occurred (so, so many RSA keys under 2048 bits...). One of the chief advantages of this plugin (IMO) is its SSH-like security model - as a rule, it won't spam warnings at you unless something is seriously wrong and it won't fail the build unless you're probably under attack (at least under default settings), so I'm hesitant to add a whole bunch of error messages for common cases that developers can't do anything about.

That being said, if we judge that SHA224 is still an improvement over SHA1 (which it is by bits of security, if not frequency of use) then I can remove it from this list.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, thanks. Just noticed it and thought it looked strange but now I know it is a reason behind it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

3 participants