On 1/19/14 9:07 PM, Nick Alexander wrote:

> I don't think we need to take any action other than to update the
> onepw docs.

Updated.. please let me know if this should be better.

https://github.com/mozilla/fxa-auth-server/wiki/onepw-protocol#crypto-notes

   """ There is no MAC on wrap(kB). If the keyserver chooses to deliver
   a bogus wrap(kB) or kA, the client might discover the problem a
   moment later when it attempts to use the key, or not, depending upon
   the high-level protocol. Sync, our first client, uses the tuple of
   (email, hash(kB), cert-generation-number) to identify a pool of
   stored user data. So Sync clients which receive a corrupt key will
   find themselves in an isolated pool, and will believe themselves to
   be the only device connected to their Sync account.

   It might be useful to add a checksum to kA and wrap(kB) to detect
   accidental corruption (e.g. store and deliver kA+SHA256(kA), or
   wrap(kB)+HMAC(unwrapBkey, wrap(kB))), but this doesn't protect
   against intentional changes, and a MAC on kB would introduce an
   additional oracle to feed a dictionary attack. We omit this checksum
   for now, assuming that disks will be reliable enough to let us never
   experience such failures.
   """

cheers,
 -Brian
_______________________________________________
Sync-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/sync-dev

Reply via email to