Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mandate that signed payloads are endpoint-specific and timestamped in Programmability sample #6285

Merged
merged 18 commits into from
Jun 26, 2024

Conversation

achamayou
Copy link
Member

@achamayou achamayou commented Jun 21, 2024

See remaining item on #6223. Introduce DynamicJSEndpointRegistry::record_action_details_for_audit_v1 and DynamicJSEndpointRegistry::is_original_action_execution_v1 to allow an application making use of the programmability feature to easily implement auditability, and protect users allowed to update the application against replay attacks.

This allows an application to define two parameters in the protected header of COSE Sign1 envelopes, for the purposes of:

  1. Making payloads specific to an endpoint, to avoid possible confusion attacks
  2. Making payloads timestamped, to implement replay protection cheaply

I have hardcoded the window size for now, but moving it to the runtime_options may be a good idea, perhaps as cose_replay_protection_window_size, or something similar. It's difficult to imagine this being useful though.

@achamayou achamayou marked this pull request as ready for review June 24, 2024 14:51
@achamayou achamayou requested a review from a team June 24, 2024 14:51
include/ccf/js/registry.h Outdated Show resolved Hide resolved
include/ccf/js/registry.h Outdated Show resolved Hide resolved
@achamayou achamayou merged commit 7768480 into microsoft:main Jun 26, 2024
21 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants