Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751683AbdITOJx (ORCPT ); Wed, 20 Sep 2017 10:09:53 -0400 Received: from frisell.zx2c4.com ([192.95.5.64]:39653 "EHLO frisell.zx2c4.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750892AbdITOJu (ORCPT ); Wed, 20 Sep 2017 10:09:50 -0400 X-Google-Smtp-Source: AOwi7QA7rTu0hx/SE6qQOXFwWJ3NS66+R9v7NKtJbrMeY5Zp2ZYwnl8ra6fqwlW24tgGDD3set2xO0S/QwfAhL/lO5Q= MIME-Version: 1.0 In-Reply-To: <1882458.VgLOd8kIdz@tauon.chronox.de> References: <2545404.XUVGGHhd0i@tauon.chronox.de> <1882458.VgLOd8kIdz@tauon.chronox.de> From: "Jason A. Donenfeld" Date: Wed, 20 Sep 2017 16:09:46 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v6] security/keys: rewrite all of big_key crypto To: Stephan Mueller Cc: linux-security-module@vger.kernel.org, keyrings@vger.kernel.org, kernel-hardening@lists.openwall.com, LKML , David Howells , Eric Biggers , Herbert Xu , Kirill Marinushkin , security@kernel.org, stable@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 350 Lines: 8 On Wed, Sep 20, 2017 at 4:06 PM, Stephan Mueller wrote: >> Section 3 shows an attack with repeated nonces, which we don't do here. > > Maybe I miss a point here, but zero IVs is no repetition of nonces? If there's a fresh key each time, then no, it's not a repetition. This patch uses a fresh random key for every encryption.