"Project lead admits to knowingly shipping side-channel vulnerabilities in their crypto library" was not on my Matrix vuln disclosure reaction bingo card
Not gonna lie this is a new one even for me
"Project lead admits to knowingly shipping side-channel vulnerabilities in their crypto library" was not on my Matrix vuln disclosure reaction bingo card
Not gonna lie this is a new one even for me
@froge @soatok OpenSSL is dragging their feet on killing weak RSA because people use it for testing. :-(
I think we should just start giving keys like this when a 512 bit key is requested:
-----BEGIN RSA PRIVATE KEY-----@soatok@furry.engineer to be fair this happens more than it should, OpenSSL for example ships default fallback code which will do most of their crypto without any constant time instructions... this is a particularly big issue on RISC-V chips, see the below github issue.
IMPORTANT DISCLAIMER: OpenSSL does this due to hardware limitations, not because they feel like doing it, unlike matrix devs ;)
https://github.com/openssl/openssl/issues/20980
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.