Re: pgcrypto decrypt_iv() issue

Поиск
Список
Период
Сортировка
От Marko Kreen
Тема Re: pgcrypto decrypt_iv() issue
Дата
Msg-id CACMqXCLEYQ-TLeew4+8VvKOCjAgk_nvFkY7rrDaauJzuQEYR8w@mail.gmail.com
обсуждение исходный текст
Ответ на Re: pgcrypto decrypt_iv() issue  (Stefan Kaltenbrunner <stefan@kaltenbrunner.cc>)
Ответы Re: pgcrypto decrypt_iv() issue
Список pgsql-bugs
On Fri, Jan 27, 2012 at 7:34 PM, Stefan Kaltenbrunner
<stefan@kaltenbrunner.cc> wrote:
> On 01/27/2012 04:20 PM, Marko Kreen wrote:
>> On Fri, Jan 27, 2012 at 01:37:11AM -0500, Tom Lane wrote:
>> Yeah, it should be fixed. =A0But note that "random data" is part of
>> decrypt() spec - the validation it can do is a joke.
>>
>> Its more important to do proper checks in encrypt() to avoid invalid
>> stored data, but there the recommended modes (CBC, CFB) can work
>> with any length data, so even there the impact is low.
>
> I agree - but in my case the input to those functions is actually coming
> from external untrusted systems - so if the data is (completely) invalid
> really want to get a proper error message instead of random memory conten=
t.

You *will* get random memory content.  If your app is exploitable with
invalid data, you *will* get exploited.  The decrypt() checks are
more for developer convenience than anything more serious.

Please fix your app to survive invalid data...

--=20
marko

В списке pgsql-bugs по дате отправления:

Предыдущее
От: Marko Kreen
Дата:
Сообщение: Re: pgcrypto decrypt_iv() issue
Следующее
От: Magnus Hagander
Дата:
Сообщение: Re: pgcrypto decrypt_iv() issue