Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Information Leakage Between Decryption and MAC Check #14

Open
jetwhiz opened this issue Mar 20, 2016 · 0 comments
Open

Information Leakage Between Decryption and MAC Check #14

jetwhiz opened this issue Mar 20, 2016 · 0 comments
Assignees
Milestone

Comments

@jetwhiz
Copy link
Owner

jetwhiz commented Mar 20, 2016

3.1 from audit: https://defuse.ca/audits/encfs.htm

EncFS uses Mac-then-Encrypt. Therefore it is possible for any processing done on the decrypted plaintext before the MAC is checked to leak information about it, in a style similar to a padding oracle vulnerability. EncFS doesn't use padding, but the MAC code does iteratively check if the entire block is zero, so the number of leading zero bytes in the plaintext is leaked by the execution time.

Mirror from upstream: vgough#17

@jetwhiz jetwhiz self-assigned this Mar 20, 2016
@jetwhiz jetwhiz added this to the 2.0-release milestone Mar 28, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant