> From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm
> Sent: Monday, 25 February, 2013 03:07

> On 2/25/2013 4:26 AM, Dave Thompson wrote:
<snip my mistake>
> The attack is against the specific timing differences that occur when
> directly implementing the RFC suggested countermeasure against the
> much larger (but different) timing side channel that would appear 
> without the countermeasure.
> 
> Specifically, with no countermeasure against the old attack, wrong
> padding would cause a much faster error response (because the MAC
> was not done), the old countermeasure causes a slightly slower
> response to wrong padding due to MAC-ing more bytes than with proper
> padding.
> 
Right. Sorry, I don't know what I was thinking.

<snip same again>
<snip RC4>

> >> - If you use the brand new AES-GCM mode (officially supported
> >> only under TLS 1.2), this is safe from the attack <snip> 

> > TLS1.2 and GCM are supported in OpenSSL only since 1.0.1,
> > but were standardized (RFCs) in 2008 and the mode itself was
> > adopted by NIST in Dec. 2007 (and proposed well before that).
> > OTOH the other TLS/SSL implementations I regularly encounter
> > haven't implemented it yet.
> 
> 2007 is recent compared to e.g. AES/Rijndael and 3DES EDE in CBC mode
> and RC4.

More recent certainly, but not "brand new".

> I have seen recent signs that Windows 7 and Server 2008 R2 support the
> GCM modes.
> 
On my newest convenient test case, IE9 on Server2008R2 SP1, 
it doesn't. As I understand the Windows design (not too well) 
SSL/TLS features need support in schannel and also in the app 
(IE or other) so this could be a problem on the IE side. But
if and when MS does support it, good.

> >
> >> The report explains new improved countermeasures that combat both
> >> the old and the new attack, and specifically praises the OpenSSL
> >> fix for being even better than their own demonstration code for
> >> the countermeasures.
> >>
> > Where is that? I don't see specific praise for the OpenSSL fix
> > either in the paper or on http://www.isg.rhul.ac.uk/tls/ .
> >
> In section 7 in a graph on page 16 and text on page 17, column 1 they
> describe how they tested their own proposed countermeasure as a patch
> against OpenSSL 1.0.1
> 
> In the last paragraph of section 7, on page 17, column 7, they describe
> that a larger patch against OpenSSL (which I presume is the one you
> applied) goes above and beyond to give away even less timing information.
> 
Aha! I re-checked, and they updated the paper without my noticing.
The version I had downloaded was dated 4 Feb., now it's 27 Feb.
On a fairly cursory comparison I see:
- they changed 1.2 to update status of implementation fixes
- they added 5.6 about the non-LAN case (briefly)
- at the beginning of 6.1 "Experimental results for GnuTLS" 
(col 1 on pg 13) they inserted a paragraph about random padding
- and they added to that last para in 7, which formerly had only the 
first sentence "To achieve further reductions ... would require ... 
'constant time' programming approach."

(Nit: I didn't apply any patch, I just use releases when they come out.)


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to