[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #3122 [Tor Client]: Write and use constant-time comparison functions



#3122: Write and use constant-time comparison functions
-------------------------+--------------------------------------------------
 Reporter:  rransom      |          Owner:  ioerror
     Type:  enhancement  |         Status:  new    
 Priority:  major        |      Milestone:         
Component:  Tor Client   |        Version:         
 Keywords:               |         Parent:         
   Points:               |   Actualpoints:         
-------------------------+--------------------------------------------------

Comment(by ioerror):

 Replying to [comment:6 rransom]:
 > Replying to [comment:2 cypherpunks]:
 > > There are a lot of places in the code where memcmp() is called on
 memory buffers that look like they might contain various hashes or
 digests:
 >
 > Applying memcmp to a hash or digest is not normally a problem.  memcmp
 is only dangerous when applied to a MAC, password, or other secret value
 which the attacker can attempt to guess one byte at a time.

 I'm not so sure that every digest we compare will be public or that every
 digest comparison is not a problem. I think that generally, we need to
 show that each one is safe based on some assumptions and then weigh the
 changes of those assumptions ever changing...

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3122#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs