[145912] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: 'Padding Oracle' Crypto Attack Affects Millions of ASP.NET Apps

daemon@ATHENA.MIT.EDU (Kevin W. Wall)
Mon Sep 27 20:10:11 2010

Date: Fri, 24 Sep 2010 17:26:43 -0400
From: "Kevin W. Wall" <kevin.w.wall@gmail.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>
CC: cryptography@metzdowd.com, tom@ritter.vg
In-Reply-To: <E1OvjHI-0008Dy-2J@wintermute02.cs.auckland.ac.nz>

Peter Gutmann wrote:
> Tom Ritter <tom@ritter.vg> writes:
> 
>> What's weird is I find confusing literature about what *is* the default for
>> protecting the viewstate.
> 
> I still haven't seen the paper/slides from the talk so it's a bit hard to
> comment on the specifics, but if you're using .NET's FormsAuthenticationTicket
> (for cookie-based auth, not viewstate protection) then you get MAC protection
> built-in, along with other nice features like sliding cookie expiration (the
> cookie expires relative to the last active use of the site rather than an
> absolute time after it was set).  I've used it in the past as an example of
> how to do cookie-based auth right

FYI...I just received confirmation from my company's on-site consultant from
Microsoft that .NET's FormsAuthenticationTicket is also vulnerable to
this padding oracle attack. So apparently Microsoft didn't apply the MAC
protection quite right in their implementation.

-kevin
-- 
Kevin W. Wall
"The most likely way for the world to be destroyed, most experts agree,
is by accident. That's where we come in; we're computer professionals.
We cause accidents."        -- Nathaniel Borenstein, co-creator of MIME

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post