mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2026-05-08 18:54:23 +02:00
Merge pull request #10568 from yanesca/add_clarifications_3.6.x
[Backport 3.6] Add miscellaneous clarifications
This commit is contained in:
26
SECURITY.md
26
SECURITY.md
@@ -145,21 +145,25 @@ Policy](https://github.com/hacl-star/hacl-star/blob/main/SECURITY.md).)
|
||||
The Everest variant is only used when `MBEDTLS_ECDH_VARIANT_EVEREST_ENABLED`
|
||||
configuration option is defined. This option is off by default.
|
||||
|
||||
#### Formatting of X.509 certificates and certificate signing requests
|
||||
#### Formatting of X509 data
|
||||
|
||||
This section discusses limitations in how X.509 objects are processed. This
|
||||
applies to certificates, certificate signing requests (CSRs) and certificate
|
||||
revocation lists (CRLs).
|
||||
|
||||
When parsing X.509 certificates and certificate signing requests (CSRs),
|
||||
Mbed TLS does not check that they are strictly compliant with X.509 and other
|
||||
relevant standards. In the case of signed certificates, the signing party is
|
||||
assumed to have performed this validation (and the certificate is trusted to
|
||||
be correctly formatted as long as the signature is correct).
|
||||
Similarly, CSRs are implicitly trusted by Mbed TLS to be standards-compliant.
|
||||
relevant standards. In the case of signed certificates and signed CRLs, the
|
||||
signing party is assumed to have performed this validation (and the certificate
|
||||
or CRL is trusted to be correctly formatted as long as the signature is
|
||||
correct). Similarly, CSRs are implicitly trusted by Mbed TLS to be
|
||||
standards-compliant.
|
||||
|
||||
**Warning!** Mbed TLS must not be used to sign untrusted CSRs unless extra
|
||||
validation is performed separately to ensure that they are compliant to the
|
||||
relevant specifications. This makes Mbed TLS on its own unsuitable for use in
|
||||
a Certificate Authority (CA).
|
||||
**Warning!** Mbed TLS must not be used to sign untrusted CSRs or CRLs unless
|
||||
extra validation is performed separately to ensure that they are compliant to
|
||||
the relevant specifications. This makes Mbed TLS on its own unsuitable for use
|
||||
in a Certificate Authority (CA).
|
||||
|
||||
However, Mbed TLS aims to protect against memory corruption and other
|
||||
undefined behavior when parsing certificates and CSRs. If a CSR or signed
|
||||
undefined behavior when parsing certificates, CSRs and CRLs. If a CSR or signed
|
||||
certificate causes undefined behavior when it is parsed by Mbed TLS, that
|
||||
is considered a security vulnerability.
|
||||
|
||||
@@ -3,6 +3,8 @@ Mbed TLS sample programs
|
||||
|
||||
This subdirectory mostly contains sample programs that illustrate specific features of the library, as well as a few test and support programs.
|
||||
|
||||
We try to ensure that the sample programs are good examples of how to use Mbed TLS but we make no hard guarantees about their security. They should not be used in production unless they have been separately tested and thoroughly audited for security. Note that this means vulnerabilities in the sample programs are out of the scope of our usual security process and will be fixed in public.
|
||||
|
||||
## Symmetric cryptography (AES) examples
|
||||
|
||||
* [`aes/crypt_and_hash.c`](aes/crypt_and_hash.c): file encryption and authentication, demonstrating the generic cipher interface and the generic hash interface.
|
||||
|
||||
Reference in New Issue
Block a user