-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for AES-IGE mode of operation #3875
Comments
We are unlikely to add something which such limited usage, particular Telegram, given it's poor cryptographic history. |
In case anyone is bothered here's a C implementation for it I wrote myself for the tiny AES library. |
Is there a case to be made in adding IGE for the sake of harm reduction? Given issues like this one: pyrogram/tgcrypto#6 I'm not sure how much maintenance burden this creates but I'll be looking into that soon. |
It wouldn’t be a maintenance burden, but any proposal for adding it needs to come up with a way to convey that it is a bad mode that shouldn’t exist and is provided solely for compatibility purposes. |
Good documentation, perhaps? An "important" or "note" block maybe with with bold words "It is not encouraged to use X unless you know what you're doing" or "You shouldn't use X and favour Y". |
We do that in some other places and it's as good as we know how to do right now. I would review an IGE patch at this point as I believe that while it's an awful mode we should support the things needed to interoperate with major projects (Even if those major projects made some very, very weird choices). Ignoring it is just encouraging people to look in more dangerous locations/do more dangerous things. To be clear, here's what is needed to land IGE:
|
So, may we reopen the issue to keep track of the progress? |
Looking at this OpenSSL has chosen to not even expose IGE mode at the EVP layer. This means supporting it requires a different codepath than every other cipher/mode we have. That is a significant maintenance burden so I think this may not be practical. |
Okay, maintaining a separate set of bindings and dedicated code just for a single (bad) cipher mode is not something we're willing to do so the answer remains no on adding support. |
Yikes! Didn't know it was this annoying to support. Thanks for humoring the idea, at least. |
I know it's only used for Telegram, but it would be nice to have it directly in this Python module.
The text was updated successfully, but these errors were encountered: