From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Jason A. Donenfeld" Date: Wed, 20 Sep 2017 14:01:21 +0000 Subject: Re: [PATCH v6] security/keys: rewrite all of big_key crypto Message-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit List-Id: References: <1593673.B5xods8kYN@tauon.chronox.de> <2545404.XUVGGHhd0i@tauon.chronox.de> In-Reply-To: <2545404.XUVGGHhd0i@tauon.chronox.de> To: Stephan Mueller Cc: linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, kernel-hardening@lists.openwall.com, LKML , David Howells , Eric Biggers , Herbert Xu , Kirill Marinushkin , security@kernel.org, stable@vger.kernel.org On Wed, Sep 20, 2017 at 3:45 PM, Stephan Mueller wrote: > http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/Joux_comments.pdf Section 3 shows an attack with repeated nonces, which we don't do here. Section 4 shows an attack using a non-96-bit nonce, which we also don't do here. From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751584AbdITOB0 (ORCPT ); Wed, 20 Sep 2017 10:01:26 -0400 Received: from frisell.zx2c4.com ([192.95.5.64]:36307 "EHLO frisell.zx2c4.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750892AbdITOBY (ORCPT ); Wed, 20 Sep 2017 10:01:24 -0400 X-Google-Smtp-Source: AOwi7QCrpROtLyzFzmCz5eeEqRAq8PcKrtzpePTLhhkfHnFKJa2+ycVWe7jEfUAJBULas45BInOz5e7Q8ILGJzUWdPo= MIME-Version: 1.0 In-Reply-To: <2545404.XUVGGHhd0i@tauon.chronox.de> References: <1593673.B5xods8kYN@tauon.chronox.de> <2545404.XUVGGHhd0i@tauon.chronox.de> From: "Jason A. Donenfeld" Date: Wed, 20 Sep 2017 16:01:21 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v6] security/keys: rewrite all of big_key crypto To: Stephan Mueller Cc: linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, kernel-hardening@lists.openwall.com, LKML , David Howells , Eric Biggers , Herbert Xu , Kirill Marinushkin , security@kernel.org, stable@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 20, 2017 at 3:45 PM, Stephan Mueller wrote: > http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/Joux_comments.pdf Section 3 shows an attack with repeated nonces, which we don't do here. Section 4 shows an attack using a non-96-bit nonce, which we also don't do here. From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jason@zx2c4.com (Jason A. Donenfeld) Date: Wed, 20 Sep 2017 16:01:21 +0200 Subject: [PATCH v6] security/keys: rewrite all of big_key crypto In-Reply-To: <2545404.XUVGGHhd0i@tauon.chronox.de> References: <1593673.B5xods8kYN@tauon.chronox.de> <2545404.XUVGGHhd0i@tauon.chronox.de> Message-ID: To: linux-security-module@vger.kernel.org List-Id: linux-security-module.vger.kernel.org On Wed, Sep 20, 2017 at 3:45 PM, Stephan Mueller wrote: > http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/Joux_comments.pdf Section 3 shows an attack with repeated nonces, which we don't do here. Section 4 shows an attack using a non-96-bit nonce, which we also don't do here. -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo at vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html From mboxrd@z Thu Jan 1 00:00:00 1970 MIME-Version: 1.0 In-Reply-To: <2545404.XUVGGHhd0i@tauon.chronox.de> References: <1593673.B5xods8kYN@tauon.chronox.de> <2545404.XUVGGHhd0i@tauon.chronox.de> From: "Jason A. Donenfeld" Date: Wed, 20 Sep 2017 16:01:21 +0200 Message-ID: Content-Type: text/plain; charset="UTF-8" Subject: [kernel-hardening] Re: [PATCH v6] security/keys: rewrite all of big_key crypto To: Stephan Mueller Cc: linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, kernel-hardening@lists.openwall.com, LKML , David Howells , Eric Biggers , Herbert Xu , Kirill Marinushkin , security@kernel.org, stable@vger.kernel.org List-ID: On Wed, Sep 20, 2017 at 3:45 PM, Stephan Mueller wrote: > http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/Joux_comments.pdf Section 3 shows an attack with repeated nonces, which we don't do here. Section 4 shows an attack using a non-96-bit nonce, which we also don't do here.