Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 10 Feb 2014 16:52:34 +0100
From: intrigeri <intrigeri@...m.org>
To: oss-security@...ts.openwall.com
Cc: Holger Levsen <holger@...er-acht.org>
Subject: CVE request: parcimonie (0.6 to 0.8, included) possible correlation between key fetches

Hi,

Holger Levsen <holger@...er-acht.org> discovered that parcimonie [1],
a privacy-friendly helper to refresh a GnuPG keyring, before version
0.8.1, is affected by a design problem that undermines the usefulness
of this piece of software, in the intended threat model. I am upstream
for parcimonie, and I maintain it in Debian.

Type of the vulnerability: information disclosure.

Description: when using parcimonie with a large keyring (1000 public
keys or more), it would always sleep exactly 10 minutes between two
key fetches. This is likely to be fingerprintable by an adversary who
can watch enough key fetches, who can then correlate multiple key
fetches with each other, which is the exact situation that parcimonie
aims at protecting against. It happens that such an adversary is part
of the threat model parcimonie is meant to cope with. This problem is
slightly mitigated by the fact that most users likely use a HKP(s)
pool as their configured GnuPG keyserver (so their successive requests
have good chances to be sent to different keyservers), and the fact
that each key fetch is done using a different Tor circuit.

Upstream bugfix: commit 8931fdcf868c37e2e8d44324d5514d235a6d5c89 in
git://gaffer.ptitcanardnoir.org/App-Parcimonie.git

Versions affected: from parcimonie 0.6 to 0.8, included. Fixed in
parcimonie 0.8.1.

This problem was made public in Debian bug #738134 [2], and was
described in details in the commit message for the upstream bugfix.

Could you please allocated a CVE id for this?

References:
[1] http://gaffer.ptitcanardnoir.org/intrigeri/code/parcimonie/
[2] https://bugs.debian.org/738134

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.