public inbox for nncp-devel@lists.cypherpunks.ru
Atom feed
From: John Goerzen <jgoerzen@complete•org>
To: Sergey Matveev <stargrave@stargrave•org>
Cc: nncp-devel@lists.cypherpunks.ru
Subject: Re: Avoiding double writes
Date: Tue, 02 Nov 2021 10:26:38 -0500	[thread overview]
Message-ID: <87sfweino1.fsf@complete.org> (raw)
In-Reply-To: <YYENGiFSehbJrJx+@stargrave.org>


On Tue, Nov 02 2021, Sergey Matveev wrote:

> Well, actually currently I do not see the strong need of the 
> size too.
> Of course it is nice to be able to quickly (just decipher single 
> block
> of data) determine real payload's size, but for years no 
> code/command
> did this, except for nncp-pkt for debugging.

Yes, and for giving user output, the size of the encrypted packet 
could be used too.

> However with MTH it is possible (if I am not wrong) to write 
> everything
> encrypted except for the first block(s), then returning back and
> preappending those first blocks with the known size. I am not 
> sure, but
> that will require changing of much NNCP internal code, aimed for
> streaming exclusively. But that won't require changing of the 
> existing
> encrypted format.

But I don't think even this is needed, since as we're saying, we 
don't have a strong need for the size.

> So format change is definitely needed now :-). It is 
> vulnerability, but
> of course not the crucial and hardly seriously exploitable, 
> leading only
> to possible real payload's size leak. Padding length has to be
> authenticated.

Interestingly, AFAIK, OpenPGP has no provision for padding and its 
packet headers are unencrypted, so agreed that it isn't a big 
deal.

> But as we are going to change the format anyway, I think that it 
> is safe
> to get rid of SIZE field completely, adding some "signalling"
> metainformation to the blocks, not forgetting about padding
> authentication. And that won't affect much code I presume.

Yes, exactly.  This metadata could be as simple as a u32 
indicating how much of the following block is actual data.  Any 
u32 value beneath 128K (including zero) would indicate we've 
reached EOF of the original data and everything past that should 
be authenticated but discarded, I think.


>>But I'm also confused about the signature - since that comes 
>>before the
>>encrypted blocks, isn't that also a problem?
>
> Signature is made over the encrypted packet's header only. It 
> comes
> after the header itself, so do not see any problems :-)

Ahh, that makes sense.  I'm not all up on my crypto algorithms, 
but if I understand correctly, each encrypted block is 
authenticated with the BLAKE3 hash of that block plus the unsigned 
portion of the header?  And since that portion of the header 
contains the public part of the session key, that prevents data 
injection attacks, right?

So it would be possible with this streaming approach to still 
determine with certainty if we have received the entire file's 
data, and the correct data, by processing the hash and header for 
each block, right?

Thanks,

- John

  reply	other threads:[~2021-11-02 15:27 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-11-01 17:47 Avoiding double writes John Goerzen
2021-11-01 19:46 ` Sergey Matveev
2021-11-02  0:11   ` John Goerzen
2021-11-02 10:03     ` Sergey Matveev
2021-11-02 15:26       ` John Goerzen [this message]
2021-11-02 17:49         ` Sergey Matveev
2021-11-02 20:48         ` Sergey Matveev