To clarify the Windows crypto fail: The problem isn't in signature validation. The problem is the *root store/cache*. CryptoAPI considers an (attacker-supplied) root CA to be in the trust store if its public key and serial match a cert in the root store, Ignoring curve params.
-
Show this thread
-
So it's not that Windows uses the wrong curve parameters or anything like that, it's that at some point the key used to index into a validated cert cache is (serial, pub) when it should be (serial, pub, params). As they say, one of the hardest problems in CS is caching.
10 replies 37 retweets 172 likesShow this thread -
Replying to @marcan42
Presumably, only for ECC...ah, because only ECC has params significant/agile in this manner?
1 reply 0 retweets 1 like -
-
Replying to @marcan42
Huh! I was thinking this reminded me of the ancient critical bit bug, and was trying to find the details of it (been a while!) and I found this *other* bug. https://csrc.nist.gov/csrc/media/publications/conference-paper/1996/10/22/proceedings-of-the-19th-nissc-1996/documents/paper075/paper.pdf …
1 reply 0 retweets 1 like -
Replying to @dakami
TBF you can do the same thing for RSA if you set e=1, but I assume they *do* consider the RSA pubkey to be e,N and not just N (or at least they reject e=1 elsewhere).
2 replies 0 retweets 0 likes -
In most RSA implementations I've seen, "e" is described as/considered part of the public key, even though it's almost always fixed as 65537 these days, but curve params are not considered part of the ECDSA public key but rather a separate thing.
1 reply 0 retweets 0 likes -
It's frequently something other than 65537 for tor hidden services. I think OpenSSH has a different default value as well. Never seen it not considered part of the public key.
1 reply 0 retweets 0 likes -
Replying to @ryancdotorg @dakami
Yeah, but as it's a fixed parameter in practice, it isn't *really* different from curve parameters for ECC. Which is interesting.
1 reply 0 retweets 0 likes -
You mean in the sense that there are only a handful of normal values and anything else is very suspicious? Also, I just remembered this:https://github.com/saltstack/salt/commit/5dd304276ba5745ec21fc1e6686a0b28da29e6fc …
2 replies 0 retweets 0 likes
Yes; technically you can generate it but it's silly.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.