Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Key material #22

Open
FiloSottile opened this issue Oct 30, 2013 · 8 comments
Open

Key material #22

FiloSottile opened this issue Oct 30, 2013 · 8 comments

Comments

@FiloSottile
Copy link

I think that how much bytes are taken out of the key strengthening function and how they are separated should be better explained.

(There is also a typo "seperate")

@maxtaco
Copy link
Contributor

maxtaco commented Oct 30, 2013

thanks, the typo is fixed.

i will tighten this when we upgrade the docs to reflect v3

@FiloSottile
Copy link
Author

Yeah, I had a bit of problems figuring out which cipher key is taken out first of the Scrypt stream

@maxtaco
Copy link
Contributor

maxtaco commented Nov 3, 2013

You are right, this is a bug. It comes from this line:

https://github.com/keybase/triplesec/blob/master/src/enc.iced#L81-L85

but that's relying on the fact that keys come out of a hash the same order they go in, and it's best not to rely on that. Thanks for pointing that out, it should be fixed.

@FiloSottile
Copy link
Author

Good, it is also a bit confusing that the order is the opposite of the one in which ciphers are listed in https://keybase.io/triplesec/

@maxtaco
Copy link
Contributor

maxtaco commented Nov 3, 2013

Ok, I will fix it in header_v3. Which order makes the most sense to you?

On Sun, Nov 3, 2013 at 2:53 PM, Filippo Valsorda
[email protected]:

Good, it is also a bit confusing that the order is the opposite of the one
in which ciphers are listed in https://keybase.io/triplesec/


Reply to this email directly or view it on GitHubhttps://github.com//issues/22#issuecomment-27652499
.

@maxtaco
Copy link
Contributor

maxtaco commented Nov 3, 2013

Actually, I'll keep it as is. but it's hmac, aes, twofish, salsa....

On Sun, Nov 3, 2013 at 3:05 PM, Maxwell Krohn [email protected] wrote:

Ok, I will fix it in header_v3. Which order makes the most sense to you?

On Sun, Nov 3, 2013 at 2:53 PM, Filippo Valsorda <[email protected]

wrote:

Good, it is also a bit confusing that the order is the opposite of the
one in which ciphers are listed in https://keybase.io/triplesec/


Reply to this email directly or view it on GitHubhttps://github.com//issues/22#issuecomment-27652499
.

@FiloSottile
Copy link
Author

Yeah, I don't have any preference for an order over the other, but it needs
to be explicitly documented.

Probably is better to keep it like it is for backwards compatibility of the
code.

On Sunday, November 3, 2013, Maxwell Krohn wrote:

Actually, I'll keep it as is. but it's hmac, aes, twofish, salsa....

On Sun, Nov 3, 2013 at 3:05 PM, Maxwell Krohn <[email protected]<javascript:_e({}, 'cvml', '[email protected]');>>
wrote:

Ok, I will fix it in header_v3. Which order makes the most sense to you?

On Sun, Nov 3, 2013 at 2:53 PM, Filippo Valsorda <
[email protected] <javascript:_e({}, 'cvml',
'[email protected]');>

wrote:

Good, it is also a bit confusing that the order is the opposite of the
one in which ciphers are listed in https://keybase.io/triplesec/


Reply to this email directly or view it on GitHub<
https://github.com/keybase/triplesec/issues/22#issuecomment-27652499>
.


Reply to this email directly or view it on GitHubhttps://github.com//issues/22#issuecomment-27653004
.

Filippo Valsorda

@SparkDustJoe
Copy link

This is a stale issue as this has been better explained on the website, and now we're in Version 4. This can probably be closed?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants