Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <loom.20131218T203727-424@post.gmane.org>
Date: Wed, 18 Dec 2013 19:41:13 +0000 (UTC)
From: mancha <mancha1@...h.com>
To: oss-security@...ts.openwall.com
Subject: Re: GnuPG 1.4.16 fixes RSA key extraction via acoustic side channel (CVE-2013-4576)

Solar Designer <solar@...> writes:
> 
> Hi,
> 
> GnuPG 1.4.16 was released today with a curious security fix:
> 
> http://lists.gnupg.org/pipermail/gnupg-devel/2013-December/028102.html
> 
>  * Fixed the RSA Key Extraction via Low-Bandwidth Acoustic
>    Cryptanalysis attack as described by Genkin, Shamir, and Tromer.
>    See <http://www.cs.tau.ac.il/~tromer/acoustic/>.  [CVE-2013-4576]
> 
> Direct link to paper (8 MB; the website feels very slow at the moment):
> 
> http://www.cs.tau.ac.il/~tromer/papers/acoustic-20131218.pdf
> 
> Copy on SlideShare:
> 
> http://www.slideshare.net/daniel_bilar/acoustic-20131218
> 
> Alexander

As the primary fix for CVE-2013-4576, GnuPG 1.x now uses blinding to
mitigate RSA key extraction attacks. This doesn't affect GnuPG 2.x as
libgcrypt does blinding by default.

The acoustic attack leveraged some particulars of GnuPG by zero-padding
input to force modular reductions in GnuPG's RSA implementation. GnuPG
now cripples this lever by normalizing MPIs used as inputs to secret
key functions.

This secondary mitigation measure was introduced in GnuPG 1.4.16 and
libgcrypt 1.6.0 (relevant for vendors shipping GnuPG 2.x).

--mancha

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.