Skip to content

Conversation

larabr
Copy link
Collaborator

@larabr larabr commented Mar 10, 2021

Changes:

  • add config.rejectPublicKeyAlgorithms to disallow using the given algos to verify, sign or encrypt new messages or third-party certifications
  • consider config.minRsaBits when signing, verifying and encrypting messages and third-party certifications, not just on key generation
  • when verifying a message, if the verification key is not found (i.e. not provided or too weak), the corresponding signature will have signature.valid=false (used to be signature.valid=null). signature.error will detail whether the key is missing/too weak/other.

Generating and verifying key certification signatures is still permitted in all cases.

@tomholub
Copy link
Contributor

Excellent!

Copy link
Member

@twiss twiss left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍 Thanks, looks good! Small nitpicks below 😊

@larabr larabr force-pushed the algo-blacklist branch 3 times, most recently from 292d04f to 2f04938 Compare March 15, 2021 12:56
@larabr larabr mentioned this pull request Mar 19, 2021
1 task
@twiss twiss merged commit 8a57246 into openpgpjs:master Mar 25, 2021
@larabr larabr deleted the algo-blacklist branch June 10, 2021 09:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants