Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Keyshare server introduces new security issues #4

Open
stef opened this issue Feb 21, 2020 · 0 comments
Open

Keyshare server introduces new security issues #4

stef opened this issue Feb 21, 2020 · 0 comments

Comments

@stef
Copy link

stef commented Feb 21, 2020

  1. The keyshare server can sample statistics about the times a user shows credentials and track the users IP address'
  2. The keyshare server can act as a target for Denial of Service for all IRMA users.

User Statistics

Each user has one "record" stored at the keyshare server and this record is accessed every time the user shows their credentials. Thus even a honest-but-curious server can learn when a user shows their credentials. In the worst case this can lead to time correlation attacks and break anonymity/unlinkability. Furthermore the keyshare server learns the IP address of the user.

Target for Denial of Service attacks

The keyshare server breaks decentralization of the protocol and acts as a possible target for DoS attacks which will have as a result that none of the users will be able to show their credentials.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant