Alicja Kario writes:
> But then you may also want to add
> https://github.com/openssl/openssl/issues/23860#issuecomment-2103073417
> (while upstream OpenSSL have decided not to call it a vulnerability,
> it's because they consider local side-channels outside of their threat
> model and we didn't try to exploit a side channel in the single-digt
> nanosecond range as that's very unlikely to be possible outside of pretty
> specific scenarios)

Thanks for the pointer. The current knowledge sounds like it'd fit the
"possible vulnerability" category. Note that CacheBleed, MemJam, and
TeeJam are attacking sub-nanosecond timing variations.

> That's the difference, my team and I aren't interested in showing attacks,
> we're interested in showing absence of any signal that can be used
> for performing timing-based attacks.

Sounds good!

---D. J. Bernstein

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to