Re: [Last-Call] Secdir last call review of draft-ietf-jmap-sieve-19

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I wasn't thinking about intentional modification. I was simply wondering how is integrity of a binary blob ensured during transit and storage.

After some further poking around, I think RFC 9404 answered all my questions. It shows how the binary blobId is generated from the blob content using one of the supported digest algorithms (like SHA1): https://datatracker.ietf.org/doc/html/rfc9404#section-4.2.1. It also mandates encoding the blob content in base64.

--Mohit

On 3/18/24 16:54, Bron Gondwana wrote:
On Mon, Mar 18, 2024, at 16:11, Mohit Sethi via Datatracker wrote:
One thing that I wondered while reading is how the integrity of the script blob
is ensured? How does the receiver verify the integrity of the binary script
content received?

I'm not sure the threat model you're worried about here.

The server gives a blobId for uploaded content and you use the ID.  The server says that this blobId will give the same content if used later.

Either the server is trustworthy and it acts on the same content, or the server isn't trustworthy and ... then what's the difference?  It could substitute anything no matter whether the data is uploaded concurrently or separately.

Bron.


--
  Bron Gondwana, CEO, Fastmail Pty Ltd


-- 
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux