Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-03 Thread Philipp Heckel
Although Tim and Matthew already mentioned the main points, I'd like to voice my concerns as well -- in particular because I think that this is *not* a philosophical argument: Security must always be more important than the supposedly correct semantics of a class or method. If you tried the same t

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-03 Thread Tim Whittington
On 4/03/2014, at 12:49 pm, Valerie (Yu-Ching) Peng wrote: > > I view this more as a major vulnerability in BC provider than > javax.crypto.CipherInputStream class and this should be reported to > BouncyCastle so they can fix their provider code. > > If you tried the same test with SunJCE pro

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-03 Thread Matthew Hall
On Mon, Mar 03, 2014 at 05:17:04PM -0800, Valerie (Yu-Ching) Peng wrote: > *Moreover, this class catches all exceptions that are not thrown by > its ancestor classes.* Then it should be able to throw an AEAD exception wrapped in an IOException, should it not? Matthew.

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-03 Thread Valerie (Yu-Ching) Peng
Well, this is just my speculation. But I think the reason that CipherInputStream swallows BadPaddingException is as its javadoc class description had: *This class adheres strictly to the semantics, especially the failure semantics, of its ancestor classes java.io.FilterInputStream and java.

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-03 Thread Matthew Hall
It's fair to say that returning unchecked data is a provider problem, but we should also try to find the explanation why the JRE swallows important cryptographic exceptions, as that's not usually recommended practice in Java. Matthew. On Mon, Mar 03, 2014 at 03:49:49PM -0800, Valerie (Yu-Ching)

Re: CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-03 Thread Valerie (Yu-Ching) Peng
I view this more as a major vulnerability in BC provider than javax.crypto.CipherInputStream class and this should be reported to BouncyCastle so they can fix their provider code. If you tried the same test with SunJCE provider, you will find that none of the decrypted data is returned to th

CipherInputStream for AEAD modes is insecure (GCM, etc.): ciphertext tampering without detection possible

2014-03-03 Thread Philipp Heckel
Hello everyone, I apologize if this is not the right place so ask/report this. Please direct me to the correct place if it isn't. I recently noticed that that the current javax.crypto.CipherInputStream implementation in OpenJDK 6/7/8 is insecure when AEAD modes are used, e.g. Cipher.getInstance("

Re: Request for Review: 8035973: NPE in ForwardBuilder

2014-03-03 Thread Jason Uh
On 3/3/14 5:38 AM, Sean Mullan wrote: On 02/28/2014 02:56 PM, Jason Uh wrote: Could I please get a review of this change? Looks fine to me, but the priority should be higher if this requires a backport to 7u. Also, the bug should be labeled with "8-na" and "9-na" since this is not an issue in

Re: Code review 8032473, Restructure JSSE regression test hierarchy in jdk test

2014-03-03 Thread Xuelei Fan
Just as you see, webrev is ugly. Here is the export changeset: http://cr.openjdk.java.net/~xuelei/8032473/update.export "hg import" should work. From the changeset, we can see the content changes in renames files. Xuelei On 3/3/2014 9:38 PM, Wang Weijun wrote: > Hi Xuelei > > Yes it's quit

Re: Request for Review: 8035973: NPE in ForwardBuilder

2014-03-03 Thread Sean Mullan
On 02/28/2014 02:56 PM, Jason Uh wrote: Could I please get a review of this change? Looks fine to me, but the priority should be higher if this requires a backport to 7u. Also, the bug should be labeled with "8-na" and "9-na" since this is not an issue in 8 and 9. --Sean Just a simple fi

Re: Code review 8032473, Restructure JSSE regression test hierarchy in jdk test

2014-03-03 Thread Wang Weijun
Hi Xuelei Yes it's quite difficult to read the actual webrev so instead I try to apply jdk.patch to my repo and see what happens. The patch file cannot remove the old files so I cannot be sure the cleanup is clean. Is it possible you recreate the webrev with a changeset (instead of jdk.patch).

Re: Code review 8032473, Restructure JSSE regression test hierarchy in jdk test

2014-03-03 Thread Xuelei Fan
webrev: http://cr.openjdk.java.net/~xuelei/8032473/webrev.00/ On 3/3/2014 1:54 PM, Wang Weijun wrote: > As Brad mentioned in the comment, do you need to update the test/TEST.groups > file? > Yes. > Although not friendly to read, you do have a webrev somewhere? > Just made it ready. Please rev