Nick Coghlan <ncogh...@gmail.com> added the comment:

That's why the vulnerable cases are far more likely to be related to 
*signature* checking. In those you can generally provide both the hash input 
(the message) and the hash target (the purported "signature").

If the signature check uses a time-dependent comparison that exhibits a lot of 
externally visible variance, then you can use a timing attack to find the 
signature that corresponds to a particular message (by keeping the message 
constant and changing the "signature"). Depending on the nature of the message, 
you're potentially done at that point (since on your final attempt your signed 
message was accepted), or else you may be after data that you can feed into an 
analysis aimed at breaking the signing key itself (a much harder prospect, but 
still possible given a sufficiently large sample, or a signing algorithm that 
is vulnerable to leaking the key as a result of chosen plaintext attacks).

Yes, system level defences are also important (that's why multiprocessing 
turned out to not, in fact, be vulnerable to an attack based on time dependent 
signature comparisons), but minimising information leakage is just a good 
principle of secure design.

----------

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue15061>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
http://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to