Uploaded image for project: 'Apache NiFi'
  1. Apache NiFi
  2. NIFI-3367

TLS Toolkit should enforce minimum length restriction on CA token

    XMLWordPrintableJSON

Details

    Description

      The TLS Toolkit uses a shared secret "token" when running in client/server mode in order to perform pre-authentication when requesting a signed certificate from the CA. There is a validation that this token is required, but not that it is of a certain length. Because the HMAC construction is available in the source code, the process could easily be brute-forced if the token value is short. We should enforce a minimum length of 16 bytes (regardless if read from config.json or provided via command line).

      We may also want to add exponential rate-limiting on failed HMAC values for the same requested public key DN in order to mitigate malicious requests.

      Attachments

        Issue Links

          Activity

            People

              alopresto Andy LoPresto
              alopresto Andy LoPresto
              Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: