-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ChaCha20 counter overflow leading to nonce reuse #64
Comments
As a general policy, we should have information on that, and presently don't, which is bad. That said, I will follow up with you via private email to discuss possible options. |
I'll go ahead and disclose this issue, saying up front that in my assessment it does not impact users of the https://github.com/RustCrypto/AEADs/blob/master/chacha20poly1305/src/cipher.rs#L55 Anyone using the This crate has a I'm disclosing in advance with it unpatched because of both the low exploitability and relatively small number of non- I will prepare a small fix, do another release, and also file a RustSec issue about it. |
[SECURITY] chacha20: ensure block counter < MAX_BLOCKS (fixes #64)
I just released a stopgap fix for this which panics in I opened #70 to track adding a falliable API to |
Hi!
What's the best place to discuss possible security issues regarding the code in this repo?
(FWIW I'm not sure it's a big issue, but I want to be sure to go through the proper channels :))
The text was updated successfully, but these errors were encountered: