-
Notifications
You must be signed in to change notification settings - Fork 523
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Timing Attack Vulnerabilities in Multiple Implementations #183
Comments
Are you saying the timing vulnerability exists in the swift version? Looking at the code, I see isEqualInConsistentTime is used to compare data. Does this vulnerability exist in this version? |
The ObjC and Swift implementations of RNCryptor (which are the primary implementations) do use constant-time hash comparisons. Have you found otherwise? The most common server side implementation is PHP, which also does constant-time hash comparisons (currently, though this took longer to get fixed then I liked). I didn't write and don't directly support all the implementations, but please feel free to open issues on any implementations with this or any other error. RNCryptor defines a format. It has several implementations that various developers maintain. If you believe there is any defect in the Swift or ObjC implementations, I am happy to look at that here, but this repository doesn't cover all the independent implementations of the format. GitHub doesn't have any way to manage organization-level issues, so a separate issue is required on each repository. Thanks. |
No, I thought this was the main repo for the entire project.
I'm sure the people who maintain the language implementations are responsible folks who keep up on security matters and won't need me to tell them individually. |
That's fine. But if you found specific implementations that had trouble, please let me know. I'm happy to open the issues myself. I'll go ahead and audit them all, but if you've already done some of it, that'll save me some time. Thanks for the notice. |
My Haskell kung-fu is weak; is this just discarding the MAC entirely? |
Yes. I believe it is discarding it. |
I made a note in RNCryptor/rncryptor-hs#2 |
OK, I think I found all the variable-time MAC validation flaws in the various implementations. I think there might be questionable choices w.r.t. the CSPRNG implementations on some of them, but until I research that in depth I don't feel comfortable raising the alarm. Have fun. |
Thank you. Always glad to have extra eyes on these things.
|
@paragonie-scott @rnapier hey folks, made a note about HMAC validation here (happy to accept pointers): |
http://www.openwall.com/lists/oss-security/2016/01/24/10
The text was updated successfully, but these errors were encountered: