Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

http://www.diceware.net/ should be available only over HTTPS TLS connection #2

Open
grempe opened this issue Jun 19, 2015 · 0 comments

Comments

@grempe
Copy link

grempe commented Jun 19, 2015

Although the random number generation and word selection is happening only on the client side you should still be serving all of your content over HTTPS for a security tool like this. This would help ensure that your content is safe from MITM and other attacks. You should re-direct all HTTP users to the HTTPS version.

e.g. what if Eve, an attacker, decided to inject different word list contents to certain users by a simple manipulation of the word list JS files. This would allow her to bias, or even choose, which possible passphrases you could generate.

You should look at using:

https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
https://en.wikipedia.org/wiki/Content_Security_Policy

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant