Vulnerability in OpenSSL

From: David Brumley (dbrumleyat_private)
Date: Thu Mar 13 2003 - 15:59:59 PST

  • Next message: Timo Sirainen: "Buffer overflows in ircII-based clients"

    Dan Boneh and I have been researching timing attacks against software
    crypto libraries.  Timing attacks are usually used to attack weak
    computing devices such as smartcards.  We've successfully developed and
    mounted timing attacks against software crypto libraries running on
    general purpose PC's.  
    
    We found that we can recover an RSA secret from OpenSSL using anywhere
    from only 300,000 to 1.4 million queries.  We demonstrated our attack
    was pratical by successfully launching an attack against Apache +
    mod_SSL and stunnel on the local network.  Our results show that timing
    attacks are practical against widely-deploy servers running on the
    network. 
    
    To our knowledge, OpenSSL and derived crypto libraries are vulnerable. 
    Mozilla's NSS is not vulnerable, as it implements RSA blinding. 
    Crypto++ is not vulnerable in practice due to it's sliding windows
    implementation (least to most significant..most to least is vulnerable).
    
    The results indicate that all crypto implementations should defend
    against timing attacks.
    
    This paper was submitted to Usenix security 03.  The link to the paper
    is here:
    http://crypto.stanford.edu/~dabo/abstracts/ssl-timing.html
    
    -David Brumley
    



    This archive was generated by hypermail 2b30 : Fri Mar 14 2003 - 10:40:58 PST