[tor-bugs] #11215 [BridgeDB]: Add timestamp/expiry to HMAC verification code in BridgeDB's local CAPTCHAs

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Mar 16 16:59:03 UTC 2014


#11215: Add timestamp/expiry to HMAC verification code in BridgeDB's local CAPTCHAs
-------------------------------------------------+-------------------------
 Reporter:  isis                                 |          Owner:  isis
     Type:  defect                               |         Status:  new
 Priority:  major                                |      Milestone:
Component:  BridgeDB                             |        Version:
 Keywords:  bridgedb-https, security,            |  Actual Points:
  bridgedb-0.1.6, easy                           |         Points:
Parent ID:                                       |
-------------------------------------------------+-------------------------
 The CAPTCHAs created in #10809 are in the form:
 {{{
 HMACFn := HMAC(HMAC_KEY, REQUEST_IP_ADDR)
 CAPTCHA_VERIFICATION := HMACFn(RSA_ENC(CAPTCHA_ANSWER))
 }}}

 When they really should be more like:
 {{{
 HMACFn := HMAC(HMAC_KEY, REQUEST_IP_ADDR)
 CAPTCHA_VERIFICATION := HMACFn(TIMESTAMP, RSA_ENC(CAPTCHA_ANSWER))
 }}}

 See
 [https://gitweb.torproject.org/bridgedb.git/commitdiff/eeb6956ed7f7ddd0f2592c17f4a5d58a580fb878
 this commit message] from the original branch. After adding the timestamp
 to the `CAPTCHA_VERIFICATION` creation in
 `bridgedb.captcha.GimpCaptcha.createChallenge()`, said timestamp should
 obviously be checked that it is not expired (according to some easily
 configurable expiration period) in
 `bridgedb.captcha.GimpCaptcha.checkSolution()`.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11215>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list