diff options
author | Adam Ierymenko <adam.ierymenko@zerotier.com> | 2016-11-08 08:32:47 -0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2016-11-08 08:32:47 -0800 |
commit | 0324e6ca3d19a70dc143d6f73c8bbcc22ac67062 (patch) | |
tree | 6ed3143e6a849f24fe9b553dd4508321a18a262b | |
parent | 830250759cd4c14ca2ae5ddf24f0a0427f258622 (diff) | |
parent | 046d5bb9ff417edf0da4f21f6cb82910a2ef817a (diff) | |
download | infinitytier-0324e6ca3d19a70dc143d6f73c8bbcc22ac67062.tar.gz infinitytier-0324e6ca3d19a70dc143d6f73c8bbcc22ac67062.zip |
Merge pull request #402 from bobberb/patch-1
Typo fix line 77
-rw-r--r-- | attic/SECURITY.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/attic/SECURITY.md b/attic/SECURITY.md index 5ca125e9..d663f84a 100644 --- a/attic/SECURITY.md +++ b/attic/SECURITY.md @@ -74,7 +74,7 @@ The first line of defense employed against remote vulnerabilities and other majo ## Cryptographic Security Practices -* We use [boring crypto](https://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf). A single symmetric algorithm (Salsa20/12), a single asymmetric algorithm (Curve25519 ECDH-256), and a single MAC (Poly1305). The way these algorithms are used is identical to how they're used in the NaCl reference implementation. The protocol supports selection of alternative algorithms but only for "future proofing" in the case that a serious flaw is discovered in any of these. Avoding algorithm bloat and cryptographic state negotiation helps guard against down-grade, "oracle," and other protocol level attacks. +* We use [boring crypto](https://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf). A single symmetric algorithm (Salsa20/12), a single asymmetric algorithm (Curve25519 ECDH-256), and a single MAC (Poly1305). The way these algorithms are used is identical to how they're used in the NaCl reference implementation. The protocol supports selection of alternative algorithms but only for "future proofing" in the case that a serious flaw is discovered in any of these. Avoiding algorithm bloat and cryptographic state negotiation helps guard against down-grade, "oracle," and other protocol level attacks. * Authenticated encryption is employed with authentication being performed prior to any other operations on received messages. See also: [the cryptographic doom principle](https://moxie.org/blog/the-cryptographic-doom-principle/). |