Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent fingerprint replay attacks #36

Open
ghost opened this issue Jul 28, 2021 · 0 comments
Open

Prevent fingerprint replay attacks #36

ghost opened this issue Jul 28, 2021 · 0 comments

Comments

@ghost
Copy link

ghost commented Jul 28, 2021

The current method relies on generating a hash of the provided fingerprint image and checking that the exact same image hasn't been sent multiple times. However, it is trivial for an attacker to alter the image by changing a single bit and bypassing the hash. Thankfully, replay attacks are protected against in several other locations in the system that are not specific to biometrics, but we should implement a better replay-protection strategy at this layer.

One solution would be to require encrypted and signed images and templates from the client and then check them here. Another could be to rate-limit requests based on the corresponding agent_id.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

0 participants