On 2010-07-14 4:12 PM, Eric Norman wrote:
If I understand the alleged attack correctly, it depends on the timing
difference if a standard
byte sequence comparison is "optimized" by exiting as soon as two bytes differ.
Has code been written that actually demonstrates that this can be effective?
That is, has code
been written to demonstrate that the time to execute, for instance, about two
instructions
between failure of the byte comparison at the first byte and failure at the
second byte can
actually be detected over a network?
While timing leaks need to be fixed as a matter of policy, perhaps by
starting the compare at a random point within the token, this is not a
real leak, since the timing difference is nanoseconds, and routing
jitter is milliseconds
_______________________________________________
security mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-security