summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAdam Ierymenko <adam.ierymenko@zerotier.com>2016-11-08 08:32:47 -0800
committerGitHub <noreply@github.com>2016-11-08 08:32:47 -0800
commit0324e6ca3d19a70dc143d6f73c8bbcc22ac67062 (patch)
tree6ed3143e6a849f24fe9b553dd4508321a18a262b
parent830250759cd4c14ca2ae5ddf24f0a0427f258622 (diff)
parent046d5bb9ff417edf0da4f21f6cb82910a2ef817a (diff)
downloadinfinitytier-0324e6ca3d19a70dc143d6f73c8bbcc22ac67062.tar.gz
infinitytier-0324e6ca3d19a70dc143d6f73c8bbcc22ac67062.zip
Merge pull request #402 from bobberb/patch-1
Typo fix line 77
-rw-r--r--attic/SECURITY.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/attic/SECURITY.md b/attic/SECURITY.md
index 5ca125e9..d663f84a 100644
--- a/attic/SECURITY.md
+++ b/attic/SECURITY.md
@@ -74,7 +74,7 @@ The first line of defense employed against remote vulnerabilities and other majo
## Cryptographic Security Practices
-* We use [boring crypto](https://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf). A single symmetric algorithm (Salsa20/12), a single asymmetric algorithm (Curve25519 ECDH-256), and a single MAC (Poly1305). The way these algorithms are used is identical to how they're used in the NaCl reference implementation. The protocol supports selection of alternative algorithms but only for "future proofing" in the case that a serious flaw is discovered in any of these. Avoding algorithm bloat and cryptographic state negotiation helps guard against down-grade, "oracle," and other protocol level attacks.
+* We use [boring crypto](https://cr.yp.to/talks/2015.10.05/slides-djb-20151005-a4.pdf). A single symmetric algorithm (Salsa20/12), a single asymmetric algorithm (Curve25519 ECDH-256), and a single MAC (Poly1305). The way these algorithms are used is identical to how they're used in the NaCl reference implementation. The protocol supports selection of alternative algorithms but only for "future proofing" in the case that a serious flaw is discovered in any of these. Avoiding algorithm bloat and cryptographic state negotiation helps guard against down-grade, "oracle," and other protocol level attacks.
* Authenticated encryption is employed with authentication being performed prior to any other operations on received messages. See also: [the cryptographic doom principle](https://moxie.org/blog/the-cryptographic-doom-principle/).