| ▲ | aleksejs 3 days ago | |||||||||||||||||||||||||||||||||||||||||||
Most of these attack vectors have been known for 10 years, and yet researchers keep finding bugs in major implementations to this day. Here's one from last week: https://portswigger.net/research/the-fragile-lock > How would you digitally sign a Json document and embed the signature in the document? You would not, because that's exactly how you get these bugs. Fortunately serialization mechanisms, whether JSON or Protobuf or XML or anything else, turn structured data into strings of bytes, and signature schemes operate on strings of bytes, so you'll have a great time signing data _after_ serializing it. | ||||||||||||||||||||||||||||||||||||||||||||
| ▲ | BaconVonPork 2 days ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||
This seems like a distinction without meaning. The question is whether JSON serializations intended for canonical signing would be somehow safer than those XML serializations. Obviously people would like all the same features that caused problems before. | ||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||