On Mon, Oct 3, 2011 at 10:01 AM, Felipe Almeida Lessa
<felipe.le...@gmail.com> wrote:
> With a timing attack a malicious user may be able to construct a valid
> MAC for his message.  However, the attacker is not able to recover the
> MAC key or the encryption key.  So you don't need to change your keys,
> just upgrade ASAP.

If you are really paranoid, you may worry about a malicious user that
created a valid cookie for an administrator expiring on 2030 while you
still haven't upgraded.  If have this level of security
paranoia/consciousness, you may want to generate new keys.  Just
delete client_session_key.aes before restarting your application with
the fixed clientsession >= 0.7.3.1 and new, random keys will be
generated for you.

Cheers, =)

-- 
Felipe.

_______________________________________________
Haskell-Cafe mailing list
Haskell-Cafe@haskell.org
http://www.haskell.org/mailman/listinfo/haskell-cafe

Reply via email to