[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Another DoS attack.



I'm posting this message to both mailing lists as this issue concerns
them both.

An attacker using either aggressive, main or base mode can send a
certificate whose RSA public key consists of a long modulus (16384) and
a non trivial exponent.
The responder will be left to do the exponentiation till hell freezes
unless of course his implementation limits the length of public key
signatures it is willing to verify.
A similar attack can be mounted using DSA.
This attack can be extended to other online protocols that use
certificates in which the responder is asked to verify a public key
signature.







Follow-Ups: