On Thu, Sep 29, 2011 at 8:57 PM, Dmitry Chestnykh
<dmi...@codingrobots.com>wrote:

> I posted a link about this concern:
> http://rdist.root.org/2010/01/07/timing-independent-array-comparison/


So why not simply add the following logic to server mode:

A) fetch config option "add-random-sleep" (integer, default=0)
B) if ((A)>0) AND user is nobody, sleep for random 1..(A) ms. (This attack
would seem to be useless for anyone but the nobody user. If you're logged
in, you've got your password, and anonymous gets a random password).

That variance is far, far higher than:

to filter it. They conclude that an attacker can reliably detect processing
> differences as low as 200 nanoseconds on a LAN or 30 microseconds on a WAN
> given only 1000 measurements.


or am i missing an important detail (that can't be ruled out!)?

-- 
----- stephan beal
http://wanderinghorse.net/home/stephan/
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to