[12581] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Bodo Moeller ] OpenSSL Security Advisory: Timing-based attacks on SSL/TLS with CBC encryption

daemon@ATHENA.MIT.EDU (Roy M. Silvernail)
Mon Feb 24 19:56:48 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
From: "Roy M. Silvernail" <roy@scytale.com>
Reply-To: roy@scytale.com
To: pgut001@cs.auckland.ac.nz (Peter Gutmann)
Date: Mon, 24 Feb 2003 18:34:29 -0600
In-Reply-To: <200302220519.h1M5JYr05021@medusa01.cs.auckland.ac.nz>
Cc: cryptography@wasabisystems.com

On Friday 21 February 2003 11:19 pm, you wrote:

> This changes the padding on each message containing the password, making
> the attack rather more difficult, and has the advantage that you don't need
> to convince the party running the server to update their software. 
> Depending on how much stuff you can send per message, you can vary it by
> quite a bit.  In the POP case the "PASS xxx" would be a single message so
> you don't have quite that much leeway, but it looks like you can add enough
> whitespace to make the padding random.  Someone else on the list posted a
> followup to say he'd tried it on two servers and they had no trouble with
> the whitespace.

Seems to me that APOP would accomplish much the same thing without the need 
for random padding, no?  Or is APOP not widely implemented?

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post