Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ensure Sparkle DSA signing procedure has random seed with high entropy #3

Open
3 tasks
riastradh-brave opened this issue May 8, 2018 · 0 comments
Open
3 tasks
Milestone

Comments

@riastradh-brave
Copy link

riastradh-brave commented May 8, 2018

  • Write down the procedure that we use to make Sparkle DSA signatures on apps.
  • Write down a SCARY WARNING that it must not be done in a VM snapshot whose state might be rolled back.
  • Ensure that whatever procedure we use -- generate_appcast, openssl dgst -dss1 -sign -- uses a reasonable procedure seeded with high entropy to generate the per-signature secret, and/or uses the equivalent of RFC 6979.

If the procedure of making a signature has low entropy and RFC 6979 or equivalent is not used, then the signatures can leak the private key, as, for example, Sony discovered the hard way with the PlayStation 3 firmware update signing key.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants