<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://www.w3.org/Bugs/Public/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4"
          urlbase="https://www.w3.org/Bugs/Public/"
          
          maintainer="sysbot+bugzilla@w3.org"
>

    <bug>
          <bug_id>18925</bug_id>
          
          <creation_ts>2012-09-19 23:13:13 +0000</creation_ts>
          <short_desc>Highlight algorithm-specific security considerations</short_desc>
          <delta_ts>2014-09-26 23:39:47 +0000</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>Web Cryptography</product>
          <component>Web Cryptography API Document</component>
          <version>unspecified</version>
          <rep_platform>PC</rep_platform>
          <op_sys>Windows NT</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>DUPLICATE</resolution>
          <dup_id>25607</dup_id>
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P2</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Ryan Sleevi">sleevi</reporter>
          <assigned_to name="David Dahl">ddahl</assigned_to>
          <cc>watsonm</cc>
          
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>74102</commentid>
    <comment_count>0</comment_count>
    <who name="Ryan Sleevi">sleevi</who>
    <bug_when>2012-09-19 23:13:13 +0000</bug_when>
    <thetext>( Raised by Travis Mayberry at http://lists.w3.org/Archives/Public/public-webcrypto-comments/2012Sep/0016.html )

The 13 September 2012 draft ( http://www.w3.org/TR/2012/WD-WebCryptoAPI-20120913/ ) includes support for PKCS#1 v1.5 modes of encryption and signing (RSAES and RSASSA). These modes are frequently subject to implementation errors that permit padding oracle attacks.

Travis suggests: &quot;I would suggest then that a note be put in emphasizing it should be used carefully and that OAEP is the better choice if you are not forced to use PKCS#1.  My main concern is that a developer, upon deciding to use this API but not being familiar with the issues we are discussing, will simply pick one of the two at random and potentially open himself up to an attack that could have easily been avoided. &quot;</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>111936</commentid>
    <comment_count>1</comment_count>
    <who name="Mark Watson">watsonm</who>
    <bug_when>2014-09-22 17:34:31 +0000</bug_when>
    <thetext>I believe this is a subset / dup of 25607. Resolve dup ?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>112330</commentid>
    <comment_count>2</comment_count>
    <who name="Mark Watson">watsonm</who>
    <bug_when>2014-09-26 23:39:47 +0000</bug_when>
    <thetext>

*** This bug has been marked as a duplicate of bug 25607 ***</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>