Fix potential side-channel timing attack issue#1375
Fix potential side-channel timing attack issue#1375Rob-Hague merged 4 commits intosshnet:developfrom
Conversation
|
What's the attack? The signature verification does not involve any private data, and in both cases we will drop the connection once the verification fails. What am I missing? |
|
AFAK, the timing attack is based on enumerous failures. |
|
https://github.com/openssh/openssh-portable/blob/88351eca17dcc55189991ba60e50819b6d4193c1/mac.c#L222 |
|
I come up with this PR when read Chaos.Nacl project.
|
The PR fixes a potential side-channel timing attack issue when verify HMAC and verify DigitalSignature.