You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This defect is a problem with the OMEMO specification. It should have called out the specific steps that implementors follow to prevent this sort of side-channel attack.
The text was updated successfully, but these errors were encountered:
So the issue is that an attacker could gain information about the real hmac because of the non-constant time comparison, right? I'd guess that this isn't realistic when triggering this remotely via network, but still of course this could be improved.
I didn't find a commonly used constant-time string comparison function in the standard library or QCA. Do you have any recommendations?
And have you considered making a proposal to update the spec?
And have you considered making a proposal to update the spec?
After the misconduct of one of the spec authors, I'm avoiding talking to them at all. Feel free to suggest it if you think it's a good use of your time.
Originally disclosed here.
qxmpp/src/omemo/QXmppOmemoManager_p.cpp
Line 1766 in 94232e7
Explainers:
This defect is a problem with the OMEMO specification. It should have called out the specific steps that implementors follow to prevent this sort of side-channel attack.
The text was updated successfully, but these errors were encountered: