-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
limit manifest size #155
Comments
I don't think we have this exact vulnerability since all of our reads are in terms of segments but we seemingly have a related one where we allocate a buffer based on a stated segment size. The simplest fix for this is likely to fix a maximum (ideally encrypted) segment size. One doesn't currently appear to exist but it might be a good idea to add one, I think. |
@mkleene This has to do more with the manifest size. I don't think we restrict that right? |
@strantalis that makes sense; I guess that if someone gives us a big TDF then it will make us consume large amounts of memory and that is still bad. I was referring to the protocol aspect where you could have a tiny TDF that advertises a large manifest and forces you to use memory. The fixes from opentdf/platform#1536 might also be relevant. I also think that adding a test for mismatched declared manifest size might be a good idea because I bet we'd just crash. |
In the go sdk it was detected that a protocol attack could happen by reading an excessively large manifest. We should introduce the same limits within the java-sdk.
Let's do a test that recreates the test done on the Go sdk, using a tdf with a large manifest, and observe the behavior in order to determine what is needed for this ticket.
REF: opentdf/platform#1385
Acceptance Criteria:
The text was updated successfully, but these errors were encountered: