Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 23 May 2018 09:47:57 -0700
From:      Conrad Meyer <cem@freebsd.org>
To:        Emeric POUPON <emeric.poupon@stormshield.eu>
Cc:        svn-src-head@freebsd.org, svn-src-all@freebsd.org,  src-committers <src-committers@freebsd.org>
Subject:   Re: svn commit: r334054 - in head: sys/kern sys/netipsec tools/tools/crypto usr.bin/netstat
Message-ID:  <CAG6CVpWv7sEzMhSoZ-yZ-NbpqbMq1i5me2e=6m2J6n1D_=mFpQ@mail.gmail.com>
In-Reply-To: <822609135.13913713.1527060223167.JavaMail.zimbra@stormshield.eu>
References:  <201805221554.w4MFsPQA083334@repo.freebsd.org> <CAG6CVpXGbyEs1owe5YMTPntj%2BoiwgY6ArmS8WeV84opkN68bVA@mail.gmail.com> <822609135.13913713.1527060223167.JavaMail.zimbra@stormshield.eu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, May 23, 2018 at 12:23 AM, Emeric POUPON
<emeric.poupon@stormshield.eu> wrote:
>> From: "Conrad Meyer" <cem@freebsd.org>
>
>> Can users control arbitrary key_allocsp() calls?  If so, it seems
>> concerning to expose hit/miss stats on cached security keys.
>
> I am not sure to understand, could you please tell more about what you mean?

If users can insert arbitrary keys into the cache, they can check the
hit/miss statistics to tell if that key was already present --
revealing key contents.  This would be a major problem.

https://security.stackexchange.com/questions/10617/what-is-a-cryptographic-oracle

Best,
Conrad



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAG6CVpWv7sEzMhSoZ-yZ-NbpqbMq1i5me2e=6m2J6n1D_=mFpQ>