Andy LoPresto created NIFI-3367:
-----------------------------------

             Summary: TLS Toolkit should enforce minimum length restriction on 
CA token
                 Key: NIFI-3367
                 URL: https://issues.apache.org/jira/browse/NIFI-3367
             Project: Apache NiFi
          Issue Type: Bug
          Components: Tools and Build
    Affects Versions: 1.1.1
            Reporter: Andy LoPresto


The TLS Toolkit uses a shared secret "token" when running in client/server mode 
in order to perform pre-authentication when requesting a signed certificate 
from the CA. There is a validation that this token is *required*, but not that 
it is of a certain length. Because the HMAC construction is available in the 
source code, the process could easily be brute-forced if the token value is 
short. We should enforce a minimum length of 16 bytes (regardless if read from 
{{config.json}} or provided via command line). 

We may also want to add exponential rate-limiting on failed HMAC values for the 
same requested public key DN in order to mitigate malicious requests. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to