-
Notifications
You must be signed in to change notification settings - Fork 1.3k
feat: add key size validation #613
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
thank you @bshaffer for getting this fix in. Does someone need to contact Mitre and get the CVE updated to show that there is a fixed version? |
|
@bshaffer should there be a way to opt-out? IIUC currently we need to request new secrets from trusted external partners on our side now :/ |
|
It's protected in a major version of the library so the way to opt out is to not upgrade to the major version until the keys are of sufficient length. I do recommend contacting your partners if their keys do not reach the minimum length security requirements, however |
|
fair; i was wondering how bad a short key really is in case of internal api calls, to a trusted partner. Unpractical at least :') |
|
@ro0NL I don't know, I just wanted the big red flags that said my library was insecure to go away |
|
our partner cannot generate new tokens, so we're stuck at v6, which is an issue. |
|
@bshaffer would you consider something like passing |
|
@ro0NL feel free to submit a PR and I'm happy to review it! I wouldn't expect you to have any problems staying on v6 for the near future. It also seems strange to me that a partner would not be able to generate new tokens. You could consider padding your existing tokens to reach the minimum key length. |
|
@bshaffer thanks for the hint about padding, this seems a reasonable workaround 👍
|
fixes #605
Slightly different implementation for #609