
3 Oct
2011
3 Oct
'11
9:10 a.m.
On Mon, Oct 3, 2011 at 10:01 AM, Felipe Almeida Lessa
With a timing attack a malicious user may be able to construct a valid MAC for his message. However, the attacker is not able to recover the MAC key or the encryption key. So you don't need to change your keys, just upgrade ASAP.
If you are really paranoid, you may worry about a malicious user that created a valid cookie for an administrator expiring on 2030 while you still haven't upgraded. If have this level of security paranoia/consciousness, you may want to generate new keys. Just delete client_session_key.aes before restarting your application with the fixed clientsession >= 0.7.3.1 and new, random keys will be generated for you. Cheers, =) -- Felipe.