Skip to content

Commit

Permalink
Add checkEdDSAFaultySignatures flag to global config
Browse files Browse the repository at this point in the history
To be able to control the deployment of the eddsa check.
Support is limited to the global config object as the affected functions
currently don't take a config input, and we don't need to selectively enable
the option anyway, so we limit the scope of the changes.
  • Loading branch information
larabr committed Nov 23, 2023
1 parent 624debe commit 7c3cf98
Show file tree
Hide file tree
Showing 4 changed files with 13 additions and 4 deletions.
2 changes: 1 addition & 1 deletion openpgp.d.ts
Original file line number Diff line number Diff line change
Expand Up @@ -345,7 +345,7 @@ interface Config {
rejectPublicKeyAlgorithms: Set<enums.publicKey>;
rejectCurves: Set<enums.curve>;
}
export var config: Config;
export var config: Config & { checkEdDSAFaultySignatures: boolean }; // option only supported if set at the global openpgp.config level

// PartialConfig has the same properties as Config, but declared as optional.
// This interface is relevant for top-level functions, which accept a subset of configuration options
Expand Down
9 changes: 8 additions & 1 deletion src/config/config.js
Original file line number Diff line number Diff line change
Expand Up @@ -286,5 +286,12 @@ export default {
* @memberof module:config
* @property {Set<String>} rejectCurves {@link module:enums.curve}
*/
rejectCurves: new Set([enums.curve.secp256k1])
rejectCurves: new Set([enums.curve.secp256k1]),
/**
* Whether to validate generated EdDSA signatures before returning them, to ensure they are not faulty signatures.
* This check will make signing 2-3 times slower.
* Faulty signatures may be generated (in principle) if random bitflips occur at specific points in the signature
* computation, and could be used to recover the signer's secret key given a second signature over the same data.
*/
checkEdDSAFaultySignatures: true
};
3 changes: 2 additions & 1 deletion src/crypto/public_key/elliptic/eddsa.js
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ import util from '../../../util';
import enums from '../../../enums';
import hash from '../../hash';
import { getRandomBytes } from '../../random';
import defaultConfig from '../../../config';

nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());

Expand Down Expand Up @@ -68,7 +69,7 @@ export async function sign(algo, hashAlgo, message, publicKey, privateKey, hashe
case enums.publicKey.ed25519: {
const secretKey = util.concatUint8Array([privateKey, publicKey]);
const signature = nacl.sign.detached(hashed, secretKey);
if (!nacl.sign.detached.verify(hashed, signature, publicKey)) {
if (defaultConfig.checkEdDSAFaultySignatures && !nacl.sign.detached.verify(hashed, signature, publicKey)) {
/**
* Detect faulty signatures caused by random bitflips during `crypto_sign` which could lead to private key extraction
* if two signatures over the same message are obtained.
Expand Down
3 changes: 2 additions & 1 deletion src/crypto/public_key/elliptic/eddsa_legacy.js
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ import nacl from '@openpgp/tweetnacl/nacl-fast-light';
import util from '../../../util';
import enums from '../../../enums';
import hash from '../../hash';
import defaultConfig from '../../../config';

nacl.hash = bytes => new Uint8Array(sha512().update(bytes).digest());

Expand All @@ -51,7 +52,7 @@ export async function sign(oid, hashAlgo, message, publicKey, privateKey, hashed
}
const secretKey = util.concatUint8Array([privateKey, publicKey.subarray(1)]);
const signature = nacl.sign.detached(hashed, secretKey);
if (!nacl.sign.detached.verify(hashed, signature, publicKey.subarray(1))) {
if (defaultConfig.checkEdDSAFaultySignatures && !nacl.sign.detached.verify(hashed, signature, publicKey.subarray(1))) {
/**
* Detect faulty signatures caused by random bitflips during `crypto_sign` which could lead to private key extraction
* if two signatures over the same message are obtained.
Expand Down

0 comments on commit 7c3cf98

Please sign in to comment.