You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jun 18, 2023. It is now read-only.
verification of pinned SSL cert hash via QR code parameter
Can you explain to me why is this important? The user only gets the SSL after reading the QRCode. I guess you want to prevent a man-in-the-middle attack?
Yes, something like that. Right now cert is fetched over non-ssl. When making our first app, we had QR code embed https://url?cert_sha256=hash&.... So, if the computer presenting QR code is secure, then you can establish the entire trust chain. It's not perfect, for example it assumes the PKI works on the subject's computer if they are doing it themselves. The disadvantage is that, for long studies, the cert couldn't be updated partway through.
What we could contribute:
when getting config URL, strip off everything after ?. At least this could be done sooner, so that if options are added in the future, old clients won't break.
The options after ? can be querystring parsed and stored somewhere
When getting server.crt (or ca.crt), if there is a hash given in qr code, verify it.
What do you think? It is a relatively specialized idea that is only useful against active attacks. Can you think of any better ways to do this? (aside: we would implement server-side support in our server, but I'm not expecting this in the aware-server. We actually have server-side support for this for another app).
Thanks,
Richard
The text was updated successfully, but these errors were encountered:
Yes, something like that. Right now cert is fetched over non-ssl. When making our first app, we had QR code embed
https://url?cert_sha256=hash&...
. So, if the computer presenting QR code is secure, then you can establish the entire trust chain. It's not perfect, for example it assumes the PKI works on the subject's computer if they are doing it themselves. The disadvantage is that, for long studies, the cert couldn't be updated partway through.What we could contribute:
?
. At least this could be done sooner, so that if options are added in the future, old clients won't break.?
can be querystring parsed and stored somewhereWhat do you think? It is a relatively specialized idea that is only useful against active attacks. Can you think of any better ways to do this? (aside: we would implement server-side support in our server, but I'm not expecting this in the aware-server. We actually have server-side support for this for another app).
Thanks,
The text was updated successfully, but these errors were encountered: