Skip to content

Commit 07e6833

Browse files
authored
Updated outdated security information about RFC6764
Updated the mitigation measures for RFC6764 security flaw and added details about DNSSEC validation challenges.
1 parent 796de06 commit 07e6833

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

SECURITY.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ All contributions are carefully reviewed by the maintainer, and all releases are
1010

1111
## RFC6764
1212

13-
I do see a major security flaw with the RFC6764 discovery. If the DNS is not to be trusted, someone can highjack the connection by spoofing the service records, and also spoofing the TLS setting, encouraging the client to connect over plain-text HTTP without certificate validation. Utilizing this it may be possible to steal the credentials. This flaw can be mitigated by using DNSSEC, but DNSSEC is not widely used, and there is currently no mechanisms in this package to verify that the DNS is secure. This will be partly mitigated by adding a `require_tls` connection parameter that is True by default.
13+
I do see a major security flaw with the RFC6764 discovery. If the DNS is not to be trusted, someone can highjack the connection by spoofing the service records, and also spoofing the TLS setting, encouraging the client to connect over plain-text HTTP without certificate validation. Utilizing this it may be possible to steal the credentials. This flaw can be mitigated by using DNSSEC, but DNSSEC is not widely used, and fixing support for DNSSEC validation in the CalDAV library was found to be non-trivial (perhaps I'll look into it again some time after 3.0 has been released). This has been mitigated by adding a require_tls` connection parameter that is True by default, plus by ensuring one isn't routed to a different domain.
1414

1515
## DDoS/OOM risk
1616

0 commit comments

Comments
 (0)