-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Threat Model for the UCP Component of Radius #73
Conversation
77392cc
to
e205a1e
Compare
d8aa313
to
61f464f
Compare
61f464f
to
d452384
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This threat model is very clear and detailed. 🚀 I especially like the simple descriptions of the architecture and how UCP fits into the overall system.
4bc32b1
to
50d60b1
Compare
5478b11
to
1df91f9
Compare
Signed-off-by: ytimocin <[email protected]>
Signed-off-by: ytimocin <[email protected]>
Signed-off-by: ytimocin <[email protected]>
Signed-off-by: ytimocin <[email protected]>
Signed-off-by: ytimocin <[email protected]>
7482de9
to
497f438
Compare
|
||
#### Threat: A Malicious Actor Could Exploit SHA-1 Weaknesses to Generate Hash Collisions | ||
|
||
**Description:** A malicious actor could exploit the known vulnerabilities of the SHA-1 hashing algorithm to generate hash collisions. The UCP currently uses SHA-1 for hashing resource IDs and generating ETags. Although SHA-1 is not used in security-sensitive contexts, its vulnerabilities could still be exploited to create hash collisions, potentially leading to data integrity issues. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't understand why this is a security threat. It's too vague.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please be more specific. A malicious user could do X to achieve Y. Y should be grounded in one of these: https://en.wikipedia.org/wiki/STRIDE_model
Signed-off-by: ytimocin <[email protected]>
497f438
to
d139693
Compare
Threat Model for the UCP Component of Radius