-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Open
Labels
Pri3Indicates issues/PRs that are low priorityIndicates issues/PRs that are low priorityarea-System.SecurityIssues related to security practices for .NET developers.Issues related to security practices for .NET developers.untriagedNew issue has not been triaged by the area ownerNew issue has not been triaged by the area owner
Description
storedHash
is directly taken from the source file, i.e. the potentially manipulated file. Would this loop not cause a timing vulnerability? The attacker could guess the first byte of the MAC, send it together with the manipulated file to the server and observe for which guess the server takes slightly longer to process. This guess can be assumed to be the correct first key MAC byte. Then the attacker can proceed to the next byte etc., essentially brute forcing the MAC one byte after another.
I think creating a hash value of both the expected and the actual MAC value and then comparing the hash value could potentially solve this.
Am I missing something?
Metadata
Metadata
Assignees
Labels
Pri3Indicates issues/PRs that are low priorityIndicates issues/PRs that are low priorityarea-System.SecurityIssues related to security practices for .NET developers.Issues related to security practices for .NET developers.untriagedNew issue has not been triaged by the area ownerNew issue has not been triaged by the area owner