[Cryptech Tech] arm

Leif Johansson leifj at sunet.se
Tue Jan 13 23:37:38 UTC 2015


On 01/13/2015 04:08 PM, Bernd Paysan wrote:
> Am Dienstag, 13. Januar 2015, 08:50:16 schrieb Leif Johansson:
>>> 13 jan 2015 kl. 03:30 skrev Bernd Paysan <bernd at net2o.de>:
>>> I would advocate against parsing more complex data types (think of ASN1)
>>> inside the ultra-secure boundary, because with bugs in the parser, you can
>>> 0wn the HSM.
>>
>> I'm wondering how much security-fu you get by just having a library for
>> doing simple offset byte-range checks wo actually parsing stuff inside the
>> boundary. Extra checks w parsing done outside the boundary...
> 
> You get very little.  Assume I want to get you to sign a ASN1 cert with a time 
> span that is much longer.  Then I pretend the time span is somewhere else in 
> the ASN1 and produce something valid there, and the byte-range check will 
> succeed.  You have a number of free-text fields in ANS1, where you can put 
> stuff that might look funny when someone actually examines the certificate, 
> but that doesn't really matter ;-). You could try to generate a public key 
> that contains something that looks like a valid ASN1 time range; that may take 
> a bit longer than the usual key generation time, but should be doable.
> 
> I suppose it's easier the other way round: The HSM inserts the signature times 
> into the fields pointed to by the signing request (you only have to check that 
> the fields are indeed inside the supplied blob), and then hashes and signs the 
> certificate, if that's easily doable.  However, I don't think it is.  ASN1 is 
> clearly a format from hell.
> 

right you are




More information about the Tech mailing list