Re: [PATCH] builtin/receive-pack: use constant-time comparison for HMAC value

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Junio C Hamano <gitster@xxxxxxxxx> writes:

> "brian m. carlson" <sandals@xxxxxxxxxxxxxxxxxxxx> writes:
>
>> When we're comparing a push cert nonce, we currently do so using strcmp.
>> Most implementations of strcmp short-circuit and exit as soon as they
>> know whether two values are equal.  This, however, is a problem when
>> we're comparing the output of HMAC, as it leaks information in the time
>> taken about how much of the two values match if they do indeed differ.
>>
>> In our case, the nonce is used to prevent replay attacks against our
>> server via the embedded timestamp and replay attacks using requests from
>> a different server via the HMAC.  Push certs, which contain the nonces,
>> are signed, so an attacker cannot tamper with the nonces without
>> breaking validation of the signature.  They can, of course, create their
>> own signatures with invalid nonces, but they can also create their own
>> signatures with valid nonces, so there's nothing to be gained.  Thus,
>> there is no security problem.
>>
>> Even though it doesn't appear that there are any negative consequences
>> from the current technique, for safety and to encourage good practices,
>> let's use a constant time comparison function for nonce verification.
>> POSIX does not provide one, but they are easy to write.
>
> Devil's advocate mode on.
>
> If the HMAC plus digital signature are the real security, even
> though writing this patch may be a nice mental exercise, is there a
> merit in deliberately adding more code and making the code
> immesurably slower by applying it? 
>
> You just established in the previous paragraph that "for safety" is
> a red herring.

Ooops, sorry, I sent it a bit too soon.

"They are easy to write" is one thing, but there is cost for keeping
two variants of memcmp() and forcing the users to choose which one
to call.  If we were to encourage good practices, what we would
encourage would not be "when in doubt, always use this pessimized
version.", but "analyse the risk, and when there can be a valid
timing analysis threat, use this one."  And to lead by example, we
would *not* be calling it in this codepath.

A patch that adds constant_memequal() *without* calling it from
check_nonce(), because we realize that there is no legitimate threat
that deserves to be protected by a call to it in this codepath,
would be a very good thing to have, in other words, as that does
encourage good practices.

End of "Devil's advocate mode".

It's not like we have audited _other_ codepaths that may benefit by
having this helper, so if we were to add constant_memequal(), let's
do so in a more library-ish place, in wrapper.c perhaps.

Thanks.




[Index of Archives]     [Linux Kernel Development]     [Gcc Help]     [IETF Annouce]     [DCCP]     [Netdev]     [Networking]     [Security]     [V4L]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux SCSI]     [Fedora Users]

  Powered by Linux