Page MenuHome GnuPG
Feed Advanced Search

Oct 20 2021

gniibe updated the task description for T5665: libgcrypt : Restrict message digest use for FIPS 140-3.
Oct 20 2021, 12:21 PM · FIPS, Bug Report, libgcrypt
gniibe added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

Perhaps, as a library (considering the benefit of users), it would be better to allow signature verification with SHA-1, to defer the decision to application.

Oct 20 2021, 12:20 PM · FIPS, Bug Report, libgcrypt
Jakuje added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

Thank you for having a look into that. The change looks fine, but I need to get some clarification about what "Legacy use" means for "Digital signature verification" in the Table 8 of https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar2.pdf

Oct 20 2021, 10:34 AM · FIPS, Bug Report, libgcrypt
gniibe added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

(3-1) is implemented: rCa23cf78102f3: cipher: Reject SHA-1 for hash+sign/verify when FIPS enabled.

Oct 20 2021, 5:13 AM · FIPS, Bug Report, libgcrypt
gniibe updated the task description for T5665: libgcrypt : Restrict message digest use for FIPS 140-3.
Oct 20 2021, 4:28 AM · FIPS, Bug Report, libgcrypt
gniibe added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

For a programmer like me, it is easier if the behavior will be:

Oct 20 2021, 4:26 AM · FIPS, Bug Report, libgcrypt
gniibe added a comment to T5433: libgcrypt: Do not use SHA1 by default.

The problem is that the SHA-1 as a digest algorithm itself is allowed in FIPS mode (for non-cryptographic digests), but using it as part of approved signature scheme is not allowed

Oct 20 2021, 3:27 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

The current code is inconsistent about its behavior: how non-approved digest algos are supported or not when FIPS enabled.

Oct 20 2021, 3:17 AM · FIPS, Bug Report, libgcrypt
gniibe added projects to T5665: libgcrypt : Restrict message digest use for FIPS 140-3: libgcrypt, Bug Report, FIPS.

If .fips will mean FIPS 140-3, why not the following patch?

diff --git a/cipher/sha1.c b/cipher/sha1.c
index 3bb24c7e..cb50ef66 100644
--- a/cipher/sha1.c
+++ b/cipher/sha1.c
@@ -759,7 +759,7 @@ static gcry_md_oid_spec_t oid_spec_sha1[] =
Oct 20 2021, 3:07 AM · FIPS, Bug Report, libgcrypt
gniibe renamed T5244: libgcrypt: Restrict MD5 use from libgcrypt: Restrict message digest use to libgcrypt: Restrict MD5 use.
Oct 20 2021, 3:04 AM · Bug Report, FIPS, libgcrypt
gniibe added a project to T5244: libgcrypt: Restrict MD5 use: Bug Report.

I created T5665: libgcrypt : Restrict message digest use for FIPS 140-3.

Oct 20 2021, 3:03 AM · Bug Report, FIPS, libgcrypt
gniibe removed a project from T5244: libgcrypt: Restrict MD5 use: Restricted Project.

Let me move this ticket as DONE (now Testing status), as the subject was solved (MD5 and soft/forced/inactive things).

Oct 20 2021, 2:54 AM · Bug Report, FIPS, libgcrypt

Oct 19 2021

Jakuje added a comment to T5433: libgcrypt: Do not use SHA1 by default.

Sorry, I was wrong. We don't need any changes.

When using gcry_pk_hash_sign and gcry_pk_hash_verify, approved digest algos are guaranteed when FIPS enabled.

Yes, it's a user of the function who supplies HD (handle for hash). (I had wrong assumption HD could be with non-approved digest algo.) But it is needed for the user to enable the HD and to feed message beforehand. At that stage, non-approved digest algo must fail.

Oct 19 2021, 11:54 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5433: libgcrypt: Do not use SHA1 by default.

I investigated if the possible change above (if applied) constitutes an ABI change: Indeed, it will be an ABI change, and an API change; code should be modified and build.

Oct 19 2021, 8:58 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5433: libgcrypt: Do not use SHA1 by default.

Sorry, I was wrong. We don't need any changes.

Oct 19 2021, 8:07 AM · FIPS, libgcrypt, Bug Report

Oct 18 2021

gniibe added a comment to T5433: libgcrypt: Do not use SHA1 by default.

I am going to implement rejecting SHA-1 through new API (hash+sign, hash+verify).

Oct 18 2021, 11:24 AM · FIPS, libgcrypt, Bug Report
werner added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

( No need to certify the DSA things)

Oct 18 2021, 11:16 AM · libgcrypt, FIPS, Bug Report
werner moved T5645: RSA/DSA keygen modification for FIPS/ACVP testing from Next to Ready for release on the FIPS board.
Oct 18 2021, 11:15 AM · libgcrypt, FIPS, Bug Report
werner moved T5617: fips: Check library integrity before running selftests from Next to Ready for release on the FIPS board.
Oct 18 2021, 11:14 AM · FIPS, libgcrypt, Bug Report

Oct 15 2021

gniibe added a comment to T5636: Run integrity checks + selftests from library constructor in FIPS.

It seems for me that the patches to random/ was written in old days.

  • Now, we have getentropy in libc
    • This is most reliable one
    • better than urandom, because it may block when kernel is not yet seeded
    • better than random, because it never blocks once kernel is seeded
  • So, the real path in rndlinux.c is actually, call to getentropy
  • No access to /dev/random or /dev/urandom any more, in fact
  • Although old code remains, non-touched
    • like use of syscall when getentropy function is not available
Oct 15 2021, 8:42 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Add doc in gcrypt.texi.

Oct 15 2021, 8:02 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T5617: fips: Check library integrity before running selftests.

Thank you. Applied.

Oct 15 2021, 4:37 AM · FIPS, libgcrypt, Bug Report

Oct 14 2021

Jakuje added a comment to T5617: fips: Check library integrity before running selftests.

OK, let us start discussion by applying the patch first.

I have wondered if introducing another state in FSM would be needed, because:

Oct 14 2021, 6:58 PM · FIPS, libgcrypt, Bug Report
gniibe triaged T5617: fips: Check library integrity before running selftests as Normal priority.

OK, let us start discussion by applying the patch first.

Oct 14 2021, 9:53 AM · FIPS, libgcrypt, Bug Report
gniibe changed the status of T5645: RSA/DSA keygen modification for FIPS/ACVP testing from Open to Testing.
Oct 14 2021, 9:29 AM · libgcrypt, FIPS, Bug Report
gniibe added a project to T5645: RSA/DSA keygen modification for FIPS/ACVP testing: Restricted Project.
Oct 14 2021, 9:28 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

Applied the RSA part.

Oct 14 2021, 9:28 AM · libgcrypt, FIPS, Bug Report
gniibe moved T5550: Fix check_binary_integrity from Next to Ready for release on the FIPS board.
Oct 14 2021, 8:13 AM · FIPS, libgcrypt

Oct 12 2021

gniibe added a comment to T5550: Fix check_binary_integrity.

Now configure with
--enable-hmac-binary-check="I know engineers. They love to change things." works.

Oct 12 2021, 8:25 AM · FIPS, libgcrypt
gniibe added a project to T5550: Fix check_binary_integrity: Restricted Project.
Oct 12 2021, 8:24 AM · FIPS, libgcrypt

Oct 11 2021

gniibe moved T5645: RSA/DSA keygen modification for FIPS/ACVP testing from Backlog to Next on the FIPS board.
Oct 11 2021, 11:06 AM · libgcrypt, FIPS, Bug Report
gniibe claimed T5645: RSA/DSA keygen modification for FIPS/ACVP testing.
Oct 11 2021, 10:57 AM · libgcrypt, FIPS, Bug Report
gniibe added a comment to T5550: Fix check_binary_integrity.

I push a change: rC070935965763: build: Use KEY_FOR_BINARY_CHECK for --enable-hmac-binary-check..

Oct 11 2021, 10:34 AM · FIPS, libgcrypt
gniibe moved T5576: New set of API for public key cryptography from Next to Backlog on the FIPS board.
Oct 11 2021, 7:19 AM · libgcrypt, Feature Request

Oct 8 2021

Jakuje added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

sorry for a confusion. We do not plan to certify DSA so disregard the second part of the patch.

Oct 8 2021, 4:17 PM · libgcrypt, FIPS, Bug Report
werner triaged T5645: RSA/DSA keygen modification for FIPS/ACVP testing as High priority.
Oct 8 2021, 3:34 PM · libgcrypt, FIPS, Bug Report
werner added a comment to T5645: RSA/DSA keygen modification for FIPS/ACVP testing.

Do we really need to support DSA in FIPS mode? I mean standard DSA and not ECDSA.

Oct 8 2021, 3:22 PM · libgcrypt, FIPS, Bug Report
Jakuje created T5645: RSA/DSA keygen modification for FIPS/ACVP testing.
Oct 8 2021, 11:05 AM · libgcrypt, FIPS, Bug Report

Oct 7 2021

gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Pushed the change: rC082ea0efa9b1: cipher: Add sign+hash, verify+hash, and random-override API.

Oct 7 2021, 8:25 AM · FIPS, libgcrypt, Feature Request

Oct 6 2021

Jakuje updated the task description for T5636: Run integrity checks + selftests from library constructor in FIPS.
Oct 6 2021, 4:47 PM · FIPS, libgcrypt, Bug Report

Oct 4 2021

Jakuje created T5636: Run integrity checks + selftests from library constructor in FIPS.
Oct 4 2021, 4:10 PM · FIPS, libgcrypt, Bug Report
werner moved T5433: libgcrypt: Do not use SHA1 by default from Backlog to Next on the FIPS board.
Oct 4 2021, 11:28 AM · FIPS, libgcrypt, Bug Report
werner moved T5617: fips: Check library integrity before running selftests from Backlog to Next on the FIPS board.
Oct 4 2021, 11:26 AM · FIPS, libgcrypt, Bug Report
werner moved T5550: Fix check_binary_integrity from Backlog to Next on the FIPS board.
Oct 4 2021, 11:26 AM · FIPS, libgcrypt
werner assigned T5617: fips: Check library integrity before running selftests to gniibe.
Oct 4 2021, 11:14 AM · FIPS, libgcrypt, Bug Report
werner moved T5600: Provide module name/version API for FIPS 140-3 from Backlog to Ready for release on the FIPS board.
Oct 4 2021, 11:13 AM · libgcrypt, FIPS, Bug Report
werner moved T5540: Update fipsdrv and cavs_driver.pl from Next to Ready for release on the FIPS board.
Oct 4 2021, 11:09 AM · FIPS, libgcrypt
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

How about:

  • Only when hash-handle is used for multiple purposes, a user needs to compose SEXP
  • when hash-handle is used for a single purpose, a user doesn't need to compose SEXP, but static one.
Oct 4 2021, 10:24 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

In the original SuSE's patch, _gcry_pk_sign_md function gets data template as SEXP as an argument, and the implementation does decomposing SEXP to get hash-algo. (A user of the function needs to compose SEXP with hash-algo.)

Oct 4 2021, 9:29 AM · FIPS, libgcrypt, Feature Request

Sep 27 2021

werner moved T5520: Fix tests in FIPS mode from Next to Ready for release on the FIPS board.
Sep 27 2021, 8:36 AM · FIPS, libgcrypt, Bug Report
aconchillo added a comment to T5610: macOS 11 or newer support: Update libtool.

These are great news. Thank you!

Sep 27 2021, 6:35 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

Pushed the change to libgpg-error and libgcrypt (1.9 and master).
Let us see if there are any problem(s) for that, I will apply it to other libraries when it will be found no problem.

Sep 27 2021, 4:16 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe renamed T5610: macOS 11 or newer support: Update libtool from Update libtool to macOS 11 or newer support: Update libtool.
Sep 27 2021, 3:31 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

Thank you for the information.
For the record, I put the link to the email submitted:
https://lists.gnu.org/archive/html/libtool-patches/2020-06/msg00001.html

Sep 27 2021, 3:30 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt

Sep 24 2021

Jakuje added a comment to T5550: Fix check_binary_integrity.

Thanks. This looks good to me.

Sep 24 2021, 9:30 AM · FIPS, libgcrypt
gniibe added a comment to T5550: Fix check_binary_integrity.

Thank you for pointing out. Since hmac256.{c,h} can be used by others, I think that it is better to keep those two files, instead of merging it into one.

Sep 24 2021, 4:08 AM · FIPS, libgcrypt

Sep 22 2021

aconchillo added a comment to T5610: macOS 11 or newer support: Update libtool.

Oh, you are right, it's not upstream. It's actually applied to Homebrew (https://brew.sh/) libtool formula which is where I originally got libtool.m4, see:

Sep 22 2021, 9:06 PM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
Jakuje added a comment to T5550: Fix check_binary_integrity.

I tried to generate a tarball from master and I failed to build the hmac256 binary because the hmac256.h was not packaged into the dist tarball in master. If hmac256 should be standalone binary, I propose it should not need have a separate header file:

Sep 22 2021, 4:53 PM · FIPS, libgcrypt
Jakuje created T5617: fips: Check library integrity before running selftests.
Sep 22 2021, 4:37 PM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

I see your point. I'd like to locate/identify where the change comes from.
I think that what you refer by "new libtool.m4" is actually macOS local change (I mean, not from libtool upstream, AFAIK).
Could you please point out the source of the change?

Sep 22 2021, 2:01 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt

Sep 21 2021

aconchillo added a comment to T5610: macOS 11 or newer support: Update libtool.

That would work, however we might hit this issue with a new macOS release. Would it make more sense to update to what the new libtool.m4 is doing? Linker flags are the same, it only changes the way they detect macOS versions:

Sep 21 2021, 8:33 PM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
werner added a comment to T5512: Implement service indicators.

Tsss, requires to allow JS for Google.

Sep 21 2021, 3:20 PM · Feature Request, FIPS, libgcrypt
pmgdeb added a comment to T5512: Implement service indicators.

Just FYI, see also how GnuTLS has proposed to implement the service indicator:
https://gitlab.com/gnutls/gnutls/-/merge_requests/1465

Sep 21 2021, 12:16 PM · Feature Request, FIPS, libgcrypt
werner added a comment to T5610: macOS 11 or newer support: Update libtool.

That does indeed not look like something which could introduce a regression.

Sep 21 2021, 11:43 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

I misunderstood as if we need to update libtool from upstream.

Sep 21 2021, 9:16 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
werner triaged T5610: macOS 11 or newer support: Update libtool as Low priority.

macOS has low priority for us and I do not want to risk any regression.

Sep 21 2021, 8:42 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

About merging our local changes.

Sep 21 2021, 8:11 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

We have our own changes for ltmain.sh and libtool.m4.

Sep 21 2021, 7:19 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

And update from automake 1.16:

Sep 21 2021, 7:02 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

It's better to update the set of files from libtool:

build-aux/ltmain.sh
m4/libtool.m4
m4/ltoptions.m4
m4/ltsugar.m4
m4/ltversion.m4
m4/lt~obsolete.m4
Sep 21 2021, 6:58 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe added a comment to T5610: macOS 11 or newer support: Update libtool.

Our libtool was 2.4.2 + Debian patches + our local changes.
Debian patches are:
https://salsa.debian.org/mckinstry/libtool/-/blob/debian/master/debian/patches/link_all_deplibs.patch
https://salsa.debian.org/mckinstry/libtool/-/blob/debian/master/debian/patches/netbsdelf.patch

Sep 21 2021, 6:57 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt
gniibe created T5610: macOS 11 or newer support: Update libtool.
Sep 21 2021, 6:33 AM · gpgme, MacOS, ntbtls, npth, libksba, libassuan, libgcrypt, gpgrt

Sep 20 2021

werner changed the status of T5600: Provide module name/version API for FIPS 140-3 from Open to Testing.

Thanks. Applied with a minor change: The string is now in a new third field.

Sep 20 2021, 8:51 AM · libgcrypt, FIPS, Bug Report

Sep 19 2021

werner claimed T5600: Provide module name/version API for FIPS 140-3.
Sep 19 2021, 1:05 PM · libgcrypt, FIPS, Bug Report

Sep 17 2021

Jakuje added a comment to T5600: Provide module name/version API for FIPS 140-3.

I have a draft, which results in the following "API" of the name-version:

Sep 17 2021, 6:13 PM · libgcrypt, FIPS, Bug Report
Jakuje added a comment to T5244: libgcrypt: Restrict MD5 use.

I had in my mind something like this:

Sep 17 2021, 3:36 PM · Bug Report, FIPS, libgcrypt
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

While data template preparation for RSA-PSS is a bit tricky, it's simple with ECDSA.

Sep 17 2021, 10:43 AM · FIPS, libgcrypt, Feature Request
werner added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Having hash-algo in the s-exp is useful because a hash handle may carry several hashes. This is sometimes useful if you do not know the hash algorithm in advance and you need to make a guess (various PGP compatibility things in gpg). But of course we can simplify this and use the default algo from the hash handle if hash-algo is missing.

Sep 17 2021, 7:59 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Thanks for your comment.

Sep 17 2021, 7:26 AM · FIPS, libgcrypt, Feature Request

Sep 16 2021

Jakuje added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Thank you. On the first sight, it looks reasonable, but I would like to experiment with it a bit to see all use cases are covered.

Sep 16 2021, 11:52 AM · FIPS, libgcrypt, Feature Request
Jakuje added a comment to T5520: Fix tests in FIPS mode.

Thanks. I think we are good here. If we will decide to pursuate the brainpool switch, I will open a new issue.

Sep 16 2021, 11:07 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

Pushed my initial implementation: rC117f5c3f8028: experiment-pk_hash_sign/verify: Implement pk_hash_sign/verify.

Sep 16 2021, 8:09 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation.

I am doing an experiment to implement gcry_pk_hash_sign.

Sep 16 2021, 7:15 AM · FIPS, libgcrypt, Feature Request
gniibe added a comment to T5520: Fix tests in FIPS mode.

Two third patches are applied to master. (@werner those parts are typo fix and tests improvement, which we agreed to push.)

Sep 16 2021, 3:01 AM · FIPS, libgcrypt, Bug Report

Sep 15 2021

werner triaged T5600: Provide module name/version API for FIPS 140-3 as Normal priority.

We can easily extend the gcry_get_config API. You can give a key or have it to return all infos. For examle
"gpgconf --show-versions" prints this about libgcrypt:

Sep 15 2021, 5:24 PM · libgcrypt, FIPS, Bug Report
Jakuje created T5600: Provide module name/version API for FIPS 140-3.
Sep 15 2021, 4:34 PM · libgcrypt, FIPS, Bug Report
werner added a comment to T5520: Fix tests in FIPS mode.

If a configure switch to disable Brainpool curves will be added, we also need to add a switch to disable NIST curves.

Sep 15 2021, 11:05 AM · FIPS, libgcrypt, Bug Report
Jakuje added a comment to T5520: Fix tests in FIPS mode.

Oh, my bad. I probably used wrong git command. Uploaded now the patches themselves:

Sep 15 2021, 9:51 AM · FIPS, libgcrypt, Bug Report
gniibe added a comment to T5520: Fix tests in FIPS mode.

disable-brainpool.patch is a text of list of patches.
I think the first two could be applied.
@Jakuje Could you please upload them?

Sep 15 2021, 9:10 AM · FIPS, libgcrypt, Bug Report
gniibe moved T5520: Fix tests in FIPS mode from Ready for release to Next on the FIPS board.
Sep 15 2021, 8:36 AM · FIPS, libgcrypt, Bug Report

Sep 14 2021

mdeslaur added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

Thanks for the clarification!

Sep 14 2021, 12:41 PM · side-channel, CVE, libgcrypt
gniibe added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

The problem of (2), is local side-channel attacks to ElGamal encryption.
We evaluated the impact, mainly for the use case of GnuPG; ElGamal keys are not that popular any more. When such an attack is possible, easier attacks would be possible.

Sep 14 2021, 7:52 AM · side-channel, CVE, libgcrypt
gniibe added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

The paper addresses two issues.
(1) https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
(2) https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2

Sep 14 2021, 7:46 AM · side-channel, CVE, libgcrypt

Sep 13 2021

werner changed the status of T5597: First 8 bytes of cache item left in clear in memory after decryption. from Open to Testing.
Sep 13 2021, 4:51 PM · libgcrypt, symmetric, Bug Report
werner added a comment to T5597: First 8 bytes of cache item left in clear in memory after decryption..

And well, the context area of the handle is also wiped at gcry_cipher_close time. Thus any standard use of aeswrap (open,encrypt/decrypt,close) is not affected.

Sep 13 2021, 4:42 PM · libgcrypt, symmetric, Bug Report
werner claimed T5597: First 8 bytes of cache item left in clear in memory after decryption..

Good catch. Thanks. This patch should fix the leak:

Sep 13 2021, 4:39 PM · libgcrypt, symmetric, Bug Report
mdeslaur added a comment to T5328: On the (in)security of Elgamal in OpenPGP.

I looks like the "cipher: Hardening ElGamal by introducing exponent blinding too." commit [1] was never applied to 1.8.x. Is that intentional? If so, is there a specific reasoning that it's not needed in 1.8.x? Thanks!

Sep 13 2021, 2:55 PM · side-channel, CVE, libgcrypt
spelissier added a project to T5597: First 8 bytes of cache item left in clear in memory after decryption.: libgcrypt.
Sep 13 2021, 11:47 AM · libgcrypt, symmetric, Bug Report
werner moved T5520: Fix tests in FIPS mode from Next to Ready for release on the FIPS board.
Sep 13 2021, 11:17 AM · FIPS, libgcrypt, Bug Report
werner moved T4894: FIPS: RSA/DSA/ECDSA are missing hashing operation from Backlog to Next on the FIPS board.
Sep 13 2021, 11:16 AM · FIPS, libgcrypt, Feature Request