Skip to content

Reorder A04 "how to prevent" paragraph for clarity#912

Open
drwetter wants to merge 6 commits intoOWASP:masterfrom
drwetter:patch-5
Open

Reorder A04 "how to prevent" paragraph for clarity#912
drwetter wants to merge 6 commits intoOWASP:masterfrom
drwetter:patch-5

Conversation

@drwetter
Copy link
Copy Markdown
Contributor

  • Also advice to deprecate RSA ciphers as browsers don´t necessarily need them anymore.

Note (and related) the Bleichenbacher issue (PKCS #1 1.5) should be removed at least as browser/server crypto is concerned. It's 8 years old, see https://robotattack.org/ . Don't know however whether this could be still an issue for developers (libraries). Anyone?

* Also advice to deprecate RSA ciphers as browsers don´t necessarily need them anymore.

Note (and related) the Bleichenbacher issue (PKCS \OWASP#1 1.5) should be removed at least as browser/server crypto is concerned. It's 8 years old, see https://robotattack.org/ . Don't know however whether this could be still an issue for developers (libraries). Anyone?
Also the thing with where to store crypto keys and similar is not easy to describe in1 to 2 lines. Sensitive keys and also passwords should not be longer stored in memory as needed:  an administrative user can access memory and could harvest passwords or keys. So I would advise to at least release (or overwrite) the memory as soon as it is not needed anymore.

At rest it should best never be stored. 

However it depends pretty much... On a classical web server you need the private key for the certificate to be on disk. OTOH e.g. in a cloud or shared hosting environment you don´t want refresh token, passwords in memory longer than needed.
... as it is not aligned much with the audience.

Kudos @HimasreeKolathur24 and @nealey
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant