Re: HMAC and timing based attacks - ticket #14445

2010-10-13 Thread Luke Plant
On Wed, 2010-10-13 at 09:44 +0100, Luke Plant wrote: > You're right. I've posted a question here: > > http://cstheory.stackexchange.com/questions/2159/creating-hmac-keys-using-a-fixed-prefix-and-a-random-string OK, we got some answers, from the theoretical angle at least. But it leaves me in th

Re: HMAC and timing based attacks - ticket #14445

2010-10-13 Thread Luke Plant
On Wed, 2010-10-13 at 15:59 +1300, Nick Phillips wrote: > > Since we are effectively using > > SHA1(different_fixed_string_for_each_application + SECRET_KEY) as the > > key, it isn't obvious to me that using > > SHA1(entirely_different_random_string_for_each_application) is really > > any differen

Re: HMAC and timing based attacks - ticket #14445

2010-10-12 Thread Nick Phillips
On Tue, 2010-10-12 at 12:03 +0100, Luke Plant wrote: > The fixed strings are used to make the keys unique per application - see > below for what the keys are like that actually end up being used. I realise that, I just couldn't remember exactly why that was necessary... but you answered that belo

Re: HMAC and timing based attacks - ticket #14445

2010-10-12 Thread Ian Clelland
On Mon, Oct 11, 2010 at 7:27 PM, Nick Phillips wrote: > First of all I should say that I'm no crypto expert, but I'm worried > about the key. Inclusion of fixed strings in a key for this type of use > rings alarm bells, as does the use of an ASCII key (albeit 50 chars > rather than the 20 recommen

Re: HMAC and timing based attacks - ticket #14445

2010-10-12 Thread Luke Plant
On Tue, 2010-10-12 at 15:27 +1300, Nick Phillips wrote: > First of all I should say that I'm no crypto expert, but I'm worried > about the key. Inclusion of fixed strings in a key for this type of use > rings alarm bells, as does the use of an ASCII key (albeit 50 chars > rather than the 20 recomm

Re: HMAC and timing based attacks - ticket #14445

2010-10-11 Thread Nick Phillips
On Mon, 2010-10-11 at 23:38 +0100, Luke Plant wrote: > Hi all > > For a while this has been on my TODO list, but I've finally got round to > it: > > * Use HMAC where appropriate in Django > * Fix timing based attacks. Cool. I'd been wondering about this for a while. > - is the new method (using

HMAC and timing based attacks - ticket #14445

2010-10-11 Thread Luke Plant
Hi all For a while this has been on my TODO list, but I've finally got round to it: * Use HMAC where appropriate in Django * Fix timing based attacks. http://code.djangoproject.com/ticket/14445 The only difficulty is with the first due to backwards compatibility - the tokens/hashes generated by