-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Question: Security #55
Comments
@datenwort sorry for the delayed response, but definitely thanks for filing this issue. One of the benefits we expected from going open source was that other devs could spot problems and weaknesses in our code, especially w.r.t. security related things. So let's have a look at the EncryptionUtils. When assessing the security of components at least the following 3 things need to be taken into account
For the 1st aspect For the 2nd aspect Regarding the cypher mode you are right that for instance CBC should be used. When requesting a cipher instance without providing the full transformation as we do in EncryptionUtils (this is discouraged and something we've missed) a default of the security provider kicks in. In the case of Sun's provider this is ECB. Using ECB is not recommended since it has a problem with semantic security. So for example if 2 clear texts with the same prefix are encrypted with the same key, the encrypted messages would also have the same prefix. In an encrypted message you would also see if the clear text has common substrings of block size which are aligned at block boundaries. In the context of our usage the first one is not a problem because every clear text is encrypted with another key which is derived from the PBKDF. The second one shouldn't be a problem either because our clear texts (some passwords) are usually smaller than AES block size (128bit). For the last aspect To sum it up
Does this help? |
Hi,
I take a look into the encryptionUtils file and find the usage of
PBKDF2WithHmacSHA1
. Did not found many information specific on the differences ofPBKDF2WithHmacSHA1
andPBKDF2WithHmacSHA256
but as far as I know SHA1 is unsecure. I also read more often that CBC algorithms should be used.Has communote weaknesses in security?
The text was updated successfully, but these errors were encountered: