-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
need robust way to handle key_update #7
Comments
Table-1 Expected Behaviors when key update fail
|
Table-2.1 Test UpdateAllKeys operation on SPDM-rs
Table-2.2 Test UpdateAllKeys operation on SPDM-EMU(libspmd)
|
Regards to this scenario: When SPDM-rs Requester create new keys and send wrong KeyUpdate operation, it can't receive Err msg from responder. Root cause: responder keys between Req and Rsp are dismatched. SPDM-rs only try spdm-rs/spdmlib/src/common/session.rs Lines 897 to 916 in 003a498
Libspdm give a good example
|
For this scenario:
Test scenario:After responder receive the correct UpdateAllkeys request and handle the key update operation (Update S2 Result:Requester get old S3 key, and responder get S3 new key, dismatched, other operation will be fail like get_measurement. Question:From spec v1.2.1 p.p.131:
Does it mean that if retry fail, session should be end when meet above scenario? |
I think we only need to consider below failure scenario:
We don't need to consider the situation that attacker can create an invalid message that can be decrypted successfully. If the attacker has such capability, then there will be no security any more. |
from intel/rust-spdm#27
if key_update message failed, we need rollback to original keys.
The text was updated successfully, but these errors were encountered: