NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

kern/58479: experimental wg(4) uses 32-bit cookie secret, not 32-byte cookie secret



>Number:         58479
>Category:       kern
>Synopsis:       experimental wg(4) uses 32-bit cookie secret, not 32-byte cookie secret
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    kern-bug-people
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Sun Jul 28 12:10:00 +0000 2024
>Originator:     Taylor R Campbell
>Release:        current, 10
>Organization:
The NetWG Cookiedation
>Environment:
>Description:
The WireGuard whitepaper https://www.wireguard.com/papers/wireguard.pdf doesn't say much about the cookie secret `R_m' (Sec. 5.4.7, `Under Load: Cookie Reply Message'), but it is a reasonable default choice for a PRF key (or `MAC' key as the whitepaper says) to be 32 bytes long.

Currently we use a 32-bit key.

While this is just for DoS mitigation, so its predictability has relatively limited security impact, we ought to use a 32-byte key instead of a 32-bit key.
>How-To-Repeat:
code inspection
>Fix:
change uint32_t to uint8_t[32]



Home | Main Index | Thread Index | Old Index