- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
ID: go-security/hmac-bytes
Language: Go
Severity: Error
Category: Security
This rule flags instances where bytes.Equal()
is used to compare HMACs. HMACs, or Hash-based Message Authentication Codes, are a type of cryptographic signature that are used to ensure the integrity and authenticity of a message. They are particularly sensitive to timing attacks, where an attacker can gain information about the secret key based on the time it takes to compare HMACs.
The bytes.Equal()
function in Go does not have constant time complexity, meaning that the time it takes to run can vary based on the input. This can leak information about the HMAC, making it susceptible to timing attacks.
To avoid this vulnerability, you should use the hmac.Equal()
function instead. This function has constant time complexity, meaning that it takes the same amount of time to run regardless of the input. This protects your HMAC comparisons from timing attacks and ensures the security of your code. For example, replace bytes.Equal(H, message)
with hmac.Equal(H, message)
.
func main(message, key []byte) {
MAC = hmac.New(sha256.New, key);
H = MAC.Sum(nil);
bytes.Equal(H, message);
bytes.Equal(message, H);
}
func main(message, key []byte) {
MAC = hmac.New(sha256.New, key);
H = MAC.Sum(nil);
hmac.Equal(H, message);
hmac.Equal(message, H);
}
|
|
For more information, please read the Code Analysis documentation
Identify code vulnerabilities directly in yourVS Code editor
Identify code vulnerabilities directly inJetBrains products