Return-Path: Delivered-To: apmail-myfaces-dev-archive@www.apache.org Received: (qmail 99050 invoked from network); 30 Sep 2010 17:02:55 -0000 Received: from unknown (HELO mail.apache.org) (140.211.11.3) by 140.211.11.9 with SMTP; 30 Sep 2010 17:02:55 -0000 Received: (qmail 828 invoked by uid 500); 30 Sep 2010 17:02:55 -0000 Delivered-To: apmail-myfaces-dev-archive@myfaces.apache.org Received: (qmail 735 invoked by uid 500); 30 Sep 2010 17:02:54 -0000 Mailing-List: contact dev-help@myfaces.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "MyFaces Development" Delivered-To: mailing list dev@myfaces.apache.org Received: (qmail 728 invoked by uid 99); 30 Sep 2010 17:02:54 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 30 Sep 2010 17:02:54 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.22] (HELO thor.apache.org) (140.211.11.22) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 30 Sep 2010 17:02:53 +0000 Received: from thor (localhost [127.0.0.1]) by thor.apache.org (8.13.8+Sun/8.13.8) with ESMTP id o8UH2XmW029448 for ; Thu, 30 Sep 2010 17:02:33 GMT Message-ID: <3216678.480631285866153616.JavaMail.jira@thor> Date: Thu, 30 Sep 2010 13:02:33 -0400 (EDT) From: "Kevin W. Wall (JIRA)" To: dev@myfaces.apache.org Subject: [jira] Created: (MYFACES-2934) Side-channel timing attack in StateUtils class may still allow padding oracle attack MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 Side-channel timing attack in StateUtils class may still allow padding oracle attack ------------------------------------------------------------------------------------ Key: MYFACES-2934 URL: https://issues.apache.org/jira/browse/MYFACES-2934 Project: MyFaces Core Issue Type: Bug Affects Versions: 1.2.9 Environment: All using MyFaces 1.2.9 Reporter: Kevin W. Wall [FYI: I'm the person who fixed the padding oracle attack in ESAPI 2.0-rc# crypto which is why I spotted this.] I did a quick code inspection of encrypt() / decrypt() methods in org.apache.myfaces.shared_impl.util.StateUtils as it relates to the fix for MYFACES-2749. Most everything is done correct (MAC is over IV+ciphertext and checked before decryption), but I noticed a subtle flaw that, at least in theory (or enough data gathering and statistical analysis), that opens a side-channel timing attack that might be still be used as a oracle in a padded oracle attack such as described by Duong and Rizzo. The problem is in the 'for' loop at lines 471-478 in StateUtils.java. You need to compare ALWAYS compare ALL the bytes in the MAC to ensure a timing side-channel attack cannot be used to as an oracle in the padding oracle attack. Contact me at kevin.w.wall@gmail.com if you need more info or want to see how it was fixed in OWASP ESAPI. -- This message is automatically generated by JIRA. - You can reply to this email to add a comment to the issue online.