Details
-
Bug
-
Status: Resolved
-
Major
-
Resolution: Fixed
-
1.1.1
Description
The TLS Toolkit uses a shared secret "token" when running in client/server mode in order to perform pre-authentication when requesting a signed certificate from the CA. There is a validation that this token is required, but not that it is of a certain length. Because the HMAC construction is available in the source code, the process could easily be brute-forced if the token value is short. We should enforce a minimum length of 16 bytes (regardless if read from config.json or provided via command line).
We may also want to add exponential rate-limiting on failed HMAC values for the same requested public key DN in order to mitigate malicious requests.
Attachments
Issue Links
- links to