You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Sep 20, 2023. It is now read-only.
As we adapt for scenarios where the KMS key is not known at runtime because we are using standard RSA encryption and not native AWS functions, I think it's important to be able to distinguish when 'decryption failure' is due to 'wrong key' versus some other issue such as encoding, escaping, truncation, etc.
I would propose we attach a public key fingerprint using MD5 or SHA, whichever allows easier matching to KMS.
This will significantly aid troubleshooting, since then without sending any confidential information, an administrator can see if there's a key match issue.
Priority-wise, this doesn't have to be top priority. If it's easy and we can knock it out, then great. But also, it's probably okay if we add later.
The text was updated successfully, but these errors were encountered:
As we adapt for scenarios where the KMS key is not known at runtime because we are using standard RSA encryption and not native AWS functions, I think it's important to be able to distinguish when 'decryption failure' is due to 'wrong key' versus some other issue such as encoding, escaping, truncation, etc.
I would propose we attach a public key fingerprint using MD5 or SHA, whichever allows easier matching to KMS.
This will significantly aid troubleshooting, since then without sending any confidential information, an administrator can see if there's a key match issue.
Priority-wise, this doesn't have to be top priority. If it's easy and we can knock it out, then great. But also, it's probably okay if we add later.
The text was updated successfully, but these errors were encountered: