On 1/21/2014, 12:40 PM, Brian Warner wrote:
On 1/19/14 9:07 PM, Nick Alexander wrote:

I don't think we need to take any action other than to update the
onepw docs.

Updated.. please let me know if this should be better.

https://github.com/mozilla/fxa-auth-server/wiki/onepw-protocol#crypto-notes

    """ There is no MAC on wrap(kB). If the keyserver chooses to deliver
    a bogus wrap(kB) or kA, the client might discover the problem a
    moment later when it attempts to use the key, or not, depending upon
    the high-level protocol. Sync, our first client, uses the tuple of
    (email, hash(kB), cert-generation-number) to identify a pool of
    stored user data. So Sync clients which receive a corrupt key will
    find themselves in an isolated pool, and will believe themselves to
    be the only device connected to their Sync account.

    It might be useful to add a checksum to kA and wrap(kB) to detect
    accidental corruption (e.g. store and deliver kA+SHA256(kA), or
    wrap(kB)+HMAC(unwrapBkey, wrap(kB))), but this doesn't protect
    against intentional changes, and a MAC on kB would introduce an
    additional oracle to feed a dictionary attack. We omit this checksum
    for now, assuming that disks will be reliable enough to let us never
    experience such failures.
    """

wfm.  Thanks, Brian.

Nick
_______________________________________________
Sync-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/sync-dev

Reply via email to