Disabling explicit EC curves encoding#29639
Conversation
14edbd0 to
58c669f
Compare
|
This is a good idea. Giving attacker control over EC domain parameters has been the source of countless problems, like CVE-2024-9143 and CVE-2022-0778. Limiting to well-known ones removes this risk and avoids allowing attackers to break the many many invariants that elliptic curve cryptography relies on. |
|
Ready for review |
simo5
left a comment
There was a problem hiding this comment.
Looks reasonable to me, only a few nits
paulidale
left a comment
There was a problem hiding this comment.
Some suggested wording changes in the changes entry.
The rest looks good.
|
After applying the change via github interface I got an CLA violation :(. Will re-push tomorrow via command line |
|
Yeah, that doesn't work :( Approved in spirit. |
|
This should be added into INSTALL.md. |
|
That is a strange email address :) |
shahsb
left a comment
There was a problem hiding this comment.
LGTM. CLA seems to be missing, please check
In case the parameters don't exactly match the well-known ones
af0b3e4 to
e7b8473
Compare
|
Taking back to draft, I need to adjust the naming, documentation, and got some ideas how to improve test skip. |
|
@simo5 @paulidale could you please reapprove? |
|
This pull request is ready to merge |
|
Merged. thanks for review! |
In case the parameters don't exactly match the well-known ones Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Simo Sorce <[email protected]> (Merged from #29639)
In case the parameters don't exactly match the well-known ones Reviewed-by: Paul Dale <[email protected]> Reviewed-by: Simo Sorce <[email protected]> (Merged from openssl#29639)
In case the parameters don't exactly match the well-known ones
Checklist