-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
digital signing extending #68
base: master
Are you sure you want to change the base?
Conversation
crypto signing and verification is very fragile, docs around this should be very precise
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sorry, I've added comments here but never published the review
@@ -720,7 +733,8 @@ key=_dcpubkeyv1 | |||
|
|||
This example indicates that the public key can be found by doing a DNS | |||
query for a TXT record called _dcpubkeyv1 in the domain specified in the | |||
syncPubKeyDomain from the template. | |||
syncPubKeyDomain from the template. | |||
After generating and adding your key can test if its available from DNS TXT records https://exampleservice.domainconnect.org/sig[here] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would rather avoid such references. If necessary we may need an implementation guide, however Getting Started on domainconnect.org worked pretty well so far.
---- | ||
A service for generating the DNS records from your public key can be found https://exampleservice.domainconnect.org/sig[here] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same here. I would rather avoid such references. If necessary we may need an implementation guide, however Getting Started on domainconnect.org worked pretty well so far.
@@ -709,6 +709,19 @@ EQ%3D%3D | |||
The Service Provider generates this signature using a private key. As indicated, | |||
this signature is generated from the query string properly URL encoded. | |||
|
|||
The Service Provider must generate the signature with RSA256 hash, | |||
PKCS1v15 padding and Base64 encode it before adding it to query parameters. | |||
Example service in python can be found https://github.com/Domain-Connect/exampleservice/blob/master/sigutil.py[here] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In the formal specification I would rather not refer to any example implementation or source code other than an example code snippet.
Side comment -> more remark to the signing part not being described that well: #93 (comment) |
crypto signing and verification is very fragile, docs around this should be very precise