-
Notifications
You must be signed in to change notification settings - Fork 18k
crypto/elliptic: P-384 is not constant-time #11499
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Milestone
Comments
To @agl for triage. |
It's quite true, but a lot of work and I've no plans to tackle it for now. However, P-384 certificates are only used as intermediates (that I've observed). ECC certificates issued by CAs have, so far as I've seen, uniformly been P-256. Thus P-384 only matters for certificate verification and, in that case, constant-time behaviour is irrelevant. |
F21
added a commit
to Boostport/kubernetes-vault
that referenced
this issue
Nov 24, 2016
…s currently unsafe. See golang/go#11499.
Fixed in 93bab8a. |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
P-384, unlike P-224 and P-256, does not have a constant time implementation in the Go standard library. This has become substantially more problematic as a result of #9333, which merged support for TLS ciphersuites that are typically used with a P-384 certificate.
(P-521 also doesn't have a constant-time implementation, but no one really uses it for anything.)
The text was updated successfully, but these errors were encountered: