diff options
author | metamuffin <metamuffin@disroot.org> | 2022-09-09 14:57:09 +0200 |
---|---|---|
committer | metamuffin <metamuffin@disroot.org> | 2022-09-09 14:57:09 +0200 |
commit | 8e4242a02e2558d5a33b570d573774a4fb2c8278 (patch) | |
tree | 73ef74b8d7fe2a7f7ad3652744823ca92058ac91 /readme.md | |
parent | ae9ed91b6d841c73ccc52acecc534053c73bfb43 (diff) | |
download | keks-meet-8e4242a02e2558d5a33b570d573774a4fb2c8278.tar keks-meet-8e4242a02e2558d5a33b570d573774a4fb2c8278.tar.bz2 keks-meet-8e4242a02e2558d5a33b570d573774a4fb2c8278.tar.zst |
Add security paragraph
Diffstat (limited to 'readme.md')
-rw-r--r-- | readme.md | 14 |
1 files changed, 14 insertions, 0 deletions
@@ -21,6 +21,20 @@ a web conferencing application - Prevent server from changing message sender - Have a security professional look at the code - Test some options like `camera_facing_mode` +- Signing key for each user +- Built-in storage for known keys + +## Security + +keks-meet _tries_ to be secure. However I am not a security expert. The current system works as follows: + +- The room name is set in the section of the URL (-> not sent to the server) +- The server receives a salted hash of the room name to group client of a room +- We use PBKDF2 (constant salt; 250000 iterations) to derive a 256-bit AES-GCM key +- +- All relayed message contents are encrypted with this key. + - Message recipient is visible to the server + - The server assigns user ids ## Usage |