View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0010056 | 10000-006: Mappings | Spec | public | 2024-12-04 16:50 | 2024-12-04 16:50 |
Reporter | Randy Armstrong | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | new | Resolution | open | ||
Product Version | 1.05.04 | ||||
Summary | 0010056: Prevent Hijacking of Session by creating chain connecting back to initial OpenSecureChannel | ||||
Description | to resolve this issue for a future ECC security policy When a ECC SecureChannel is renewed, the ECDH algoritm is used IKM0 = the x-coordinate of the shared secret of the initial handshake The key derivation algorithm as defined in part 6, IKM = IKM0 xor IKM1 instead of deriving the session keys directly out of IKM1, IKM = IKM0 xor IKM1 xor IKM2 etc, etc. So it is impossible to know the session keys unless all ECDH secrets are This should prevent any successful session take-over attack. | ||||
Tags | No tags attached. | ||||
Commit Version | |||||
Fix Due Date | |||||
Date Modified | Username | Field | Change |
---|---|---|---|
2024-12-04 16:50 | Randy Armstrong | New Issue |