[tor-bugs] #3122 [Tor Client]: Write and use constant-time comparison functions
Tor Bug Tracker & Wiki
torproject-admin at torproject.org
Sat May 7 01:48:16 UTC 2011
#3122: Write and use constant-time comparison functions
-------------------------+--------------------------------------------------
Reporter: rransom | Owner: ioerror
Type: enhancement | Status: new
Priority: major | Milestone:
Component: Tor Client | Version:
Keywords: | Parent:
Points: | Actualpoints:
-------------------------+--------------------------------------------------
Comment(by ioerror):
Replying to [comment:6 rransom]:
> Replying to [comment:2 cypherpunks]:
> > There are a lot of places in the code where memcmp() is called on
memory buffers that look like they might contain various hashes or
digests:
>
> Applying memcmp to a hash or digest is not normally a problem. memcmp
is only dangerous when applied to a MAC, password, or other secret value
which the attacker can attempt to guess one byte at a time.
I'm not so sure that every digest we compare will be public or that every
digest comparison is not a problem. I think that generally, we need to
show that each one is safe based on some assumptions and then weigh the
changes of those assumptions ever changing...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/3122#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list