NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
kern/58479: experimental wg(4) uses 32-bit cookie secret, not 32-byte cookie secret
>Number: 58479
>Category: kern
>Synopsis: experimental wg(4) uses 32-bit cookie secret, not 32-byte cookie secret
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Sun Jul 28 12:10:00 +0000 2024
>Originator: Taylor R Campbell
>Release: current, 10
>Organization:
The NetWG Cookiedation
>Environment:
>Description:
The WireGuard whitepaper https://www.wireguard.com/papers/wireguard.pdf doesn't say much about the cookie secret `R_m' (Sec. 5.4.7, `Under Load: Cookie Reply Message'), but it is a reasonable default choice for a PRF key (or `MAC' key as the whitepaper says) to be 32 bytes long.
Currently we use a 32-bit key.
While this is just for DoS mitigation, so its predictability has relatively limited security impact, we ought to use a 32-byte key instead of a 32-bit key.
>How-To-Repeat:
code inspection
>Fix:
change uint32_t to uint8_t[32]
Home |
Main Index |
Thread Index |
Old Index