-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Compliance with metadata specification UVF - Universal Vault Format (Key Rotation) #19
Comments
@overheadhunter could you detail on what we need for v1 with respect to https://iterate-ch.atlassian.net/wiki/spaces/ITERATE/pages/26574860/2023-09-13+Meeting+notes ? |
|
@overheadhunter what about https://github.com/encryption-alliance/unified-vault-format/pull/19/files - does this imply modifications for v1? |
Yes I plan to support key rotation from day 1, as adding it later is a risky migration that may be exploited by downgrade attacks. |
@overheadhunter do we need more than https://github.com/shift7-ch/cipherduck-hub/pull/1/files#r1448542864 for v1? |
This one is unrelated to key rotation. So, this one is not sufficient. I'll try to draft the minimal diff required to add key rotation as specified in encryption-alliance/unified-vault-format#19 to our existing vault format. |
Discussion with @overheadhunter Migration MUST requirements
Migrations SHOULD requirements
Cipherduck Strategy
Implementation
Migration risks w.r.t. uvf-to-be
Next steps
|
As far as I can see,
@overheadhunter 1) Would it make sense to extend We then need to pass through the |
Discussion with @overheadhunter
Code Terminlogy
|
Need to discuss with @overheadhunter
|
pro memoria:
|
Story
Acceptance Criteria
shortening: nothing to do?extended attributes or migration plan for extended attributesOpen Questions
Context
vault.uvf
metadata file encryption-alliance/unified-vault-format#19Implementation
The text was updated successfully, but these errors were encountered: