[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #3122 [Tor Client]: Write and use constant-time comparison functions
#3122: Write and use constant-time comparison functions
-------------------------+--------------------------------------------------
Reporter: rransom | Owner: ioerror
Type: enhancement | Status: new
Priority: major | Milestone:
Component: Tor Client | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by ioerror):
Replying to [comment:6 rransom]:
> Replying to [comment:2 cypherpunks]:
> > There are a lot of places in the code where memcmp() is called on
memory buffers that look like they might contain various hashes or
digests:
>
> Applying memcmp to a hash or digest is not normally a problem. memcmp
is only dangerous when applied to a MAC, password, or other secret value
which the attacker can attempt to guess one byte at a time.
I'm not so sure that every digest we compare will be public or that every
digest comparison is not a problem. I think that generally, we need to
show that each one is safe based on some assumptions and then weigh the
changes of those assumptions ever changing...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3122#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs