Skip to content

Commit

Permalink
Script updating gh-pages from 2918a38. [ci skip]
Browse files Browse the repository at this point in the history
  • Loading branch information
ID Bot committed Aug 30, 2024
1 parent b643c67 commit e4322e5
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -1408,7 +1408,7 @@ <h2 id="name-security-considerations">
However, in both CTT and TTC mode, a denial of service can occur if the attacker can adjust the relying party's clock so that the CMS validation fails.
This could disrupt the timestamp validation.<a href="#section-5-3" class="pilcrow"></a></p>
<p id="section-5-4">In CTT mode, an attacker could manipulate the unprotected header by removing or replacing the timestamp.
To avoid that, the signed COSE object should be securely wrapped in an envelope during transit and at rest.<a href="#section-5-4" class="pilcrow"></a></p>
To avoid that, the signed COSE object should be integrity protected during transit and at rest.<a href="#section-5-4" class="pilcrow"></a></p>
<p id="section-5-5">In TTC mode, the TSA is given an opaque identifier (a cryptographic hash value) for the payload.
While this means that the content of the payload is not directly revealed, to prevent comparison with known payloads or disclosure of identical payloads being used over time, the payload would need to be armored, e.g., with a nonce that is shared with the recipient of the header parameter but not the TSA.
Such a mechanism can be employed inside the ones described in this specification, but is out of scope for this document.<a href="#section-5-5" class="pilcrow"></a></p>
Expand Down
3 changes: 1 addition & 2 deletions seccons++/draft-birkholz-cose-tsa-tst-header-parameter.txt
Original file line number Diff line number Diff line change
Expand Up @@ -241,8 +241,7 @@ Table of Contents

In CTT mode, an attacker could manipulate the unprotected header by
removing or replacing the timestamp. To avoid that, the signed COSE
object should be securely wrapped in an envelope during transit and
at rest.
object should be integrity protected during transit and at rest.

In TTC mode, the TSA is given an opaque identifier (a cryptographic
hash value) for the payload. While this means that the content of
Expand Down

0 comments on commit e4322e5

Please sign in to comment.