oss-sec mailing list archives

Re: BoringSSL private key loading is not constant time


From: Billy Brumley <bbb () iki fi>
Date: Tue, 14 Oct 2025 12:10:23 -0400 (EDT)

Hey Alex,

it's not really an attack of note. In this case, as I understand it,
the only thing that's alleged to be leaked is the length of a key,
which already wasn't confidential.

Is byte 31 (indexed from zero, bc I'm a computer scientist, not a savage) of Jeff's BitCoin private key confidential or not?

The leak reveals if it's all-zero or not, which of course, 1/256 keys are, so it affects a significant portion of the Internet. (Maybe not Jeff, but I assure you Jeff is significant, and I value him as a human being.)

It's your reputation as a securty profession on the line, so please speak up. You chose to have the discussion on oss-security without understanding the post, so here we are.

(I'm shocked we're still battling this CVE 15 years later. This was the running joke in the talk.)

Let us know,

BBB

--
Dr. Billy B. Brumley, D.Sc. (Tech.)
Research Director, ESL Global Cybersecurity Institute (GCI)
Kevin O'Sullivan Endowed Professor, Department of Cybersecurity (CSEC)
Director, Platform Security Laboratory (PLATSEC)
Rochester Institute of Technology
Cybersecurity Hall 70-1770
100 Lomb Memorial Drive
Rochester, NY, 14623-5608, USA
S/MIME public key: https://people.rit.edu/bbbics/bbbics () rit edu crt
S/MIME public key: https://people.rit.edu/bbbics/bbb () iki fi crt
https://www.rit.edu/directory/bbbics-billy-brumley
https://www.rit.edu/cybersecurity/

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature


Current thread: