
oss-sec mailing list archives
Re: BoringSSL private key loading is not constant time
From: Billy Brumley <bbb () iki fi>
Date: Tue, 14 Oct 2025 16:33:04 -0400 (EDT)
Before I start, I've been a member of this list since c. 2010 when I was a PhD student.
Unfortunately David Benjamin is not being genuine in his reply, and is playing the cat-and-mouse misinformation game.
And extra bonus, being super rude to up-and-coming security professionals is the modus operandi for Google security engineers. (Not me, I have thick skin. But for all the gen avo kids out there.)
Because a student (and I) reported this issue in 2019 to his company Digging the 2019 reply then: """In order to avoid cross-thread synchronization overhead later, we cache the public part of the key at load time as you've noted. The second recomputation is inefficient and due to the way that the code is structured. We haven't optimised it away as key-loading is typically not a hot spot.
We intend that operations on the private key be constant time with the usual definition. (I.e. the trace of instructions executed and memory locations accessed does not depend on the contents of the secret.) We don't aim to defend against physical side-channel analysis.
On those grounds, doing extra private-key operations is not a security concern because, if we're not leaking any information, two times nothing is still nothing. If you find that our implementation isn't constant-time, we would consider that to be a security concern. """
I'm sure those of you listening closely, and that are capable of critical thinking, understand the statement
"If you find that our implementation isn't constant-time, we would consider that to be a security concern"
directly conflicts with what David said. There's some transparancy for you. A hint to Google security folks: the correct reply, at this stage, is"Sorry about that. We screwed up, we understand, you're right, you've dedicated your life to this and we're just humble engineers. Thanks so much for donating your time and a shit-ton of European tax-payer money to a $350b company. We'll fix it."
Cheers, BBB -- Dr. Billy B. Brumley, D.Sc. (Tech.) Research Director, ESL Global Cybersecurity Institute (GCI) Kevin O'Sullivan Endowed Professor, Department of Cybersecurity (CSEC) Director, Platform Security Laboratory (PLATSEC) Rochester Institute of Technology Cybersecurity Hall 70-1770 100 Lomb Memorial Drive Rochester, NY, 14623-5608, USA S/MIME public key: https://people.rit.edu/bbbics/bbbics () rit edu crt S/MIME public key: https://people.rit.edu/bbbics/bbb () iki fi crt https://www.rit.edu/directory/bbbics-billy-brumley https://www.rit.edu/cybersecurity/
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
Current thread:
- Re: BoringSSL private key loading is not constant time, (continued)
- Re: BoringSSL private key loading is not constant time Jeffrey Walton (Oct 13)
- Re: BoringSSL private key loading is not constant time Peter Gutmann (Oct 13)
- Re: BoringSSL private key loading is not constant time Alex Gaynor (Oct 14)
- Re: BoringSSL private key loading is not constant time Peter Gutmann (Oct 14)
- Re: BoringSSL private key loading is not constant time Demi Marie Obenour (Oct 14)
- Re: BoringSSL private key loading is not constant time Billy Brumley (Oct 14)
- Re: BoringSSL private key loading is not constant time Billy Brumley (Oct 14)
- Re: BoringSSL private key loading is not constant time David Benjamin (Oct 14)
- Re: BoringSSL private key loading is not constant time Hanno Böck (Oct 14)
- Re: BoringSSL private key loading is not constant time Alex Gaynor (Oct 14)
- Re: BoringSSL private key loading is not constant time Peter Gutmann (Oct 13)
- Re: BoringSSL private key loading is not constant time Billy Brumley (Oct 14)
- Re: BoringSSL private key loading is not constant time Jacob Bachmeyer (Oct 14)
- Re: BoringSSL private key loading is not constant time Jeffrey Walton (Oct 13)