If the credentials (public key) are publicly stored after user registration, will there be security risks? #207
Replies: 1 comment 2 replies
-
TL;DR, yes it adds security risk, but you have to weigh the risk and how it affects your application to determine what mitigations are best. It depends. As technology and means to break encryption improve breaking them depending on the choices made by authenticators may lead to issues. I personally don't think this is a major concern overall but technically if they have access to this information you're giving them the means by which they can verify they broke the measure, and they can do that offline. For these reasons I'd personally recommend storing it in a location where the associated user can view the content. Additionally if you store them publicly in a location where any user can modify them directly there is a security risk there that the user or users able to modify them directly can bypass the authentication measure entirely. To mitigate risks around this I would recommend storing them with reversible encryption which has inbuilt signature validation like AES-GCM so that just being able to write to the location where the public key is would not be sufficient to bypass authentication (they need your encryption key as well). This prevents malicious actors who have access to the storage location but do not have access to the encryption key. |
Beta Was this translation helpful? Give feedback.
-
It is difficult to get the private key from the public key in asymmetric algorithms, so can we store the credentials publicly?
Beta Was this translation helpful? Give feedback.
All reactions