![]() ![]() He threat actor gained access to the Development environment using a developer’s compromised endpoint. N unauthorized party gained access to portions of the LastPass development environment through a single compromised developer account.Ī follow-up announcement about a month later was similarly inconclusive: These comments were made by a reader of Palant's blog and not the security researcher themselves, as previously and incorrectly reported.Popular password management company LastPass has been under the pump this year, following a network intrusion back in August 2022.ĭetails of how the attackers first got in are still scarce, with LastPass’s first official comment cautiously stating that: This story was updated to correct the attribution of comments on the behavior of older Bitwarden account. In response to queries from The Daily Swig, Bitwarden confirmed that “defaults are increasing”, adding that user had previously been able to “adjust and increase iterations anytime”. “They give no indication on the timeline for this change and are vague about whether existing accounts will automatically be upgraded to the new, higher default,” a poster on Bitwarden’s community forum writes.Īccording to a subsequent post on the same forum, Bitwarden is treating this criticism as a feature request. It’s still somewhat unclear whether or not existing accounts will automatically be updated.Ī post by BitWarden to Mastodon left some in the community scratching their heads. This figure was later upped to 600,000 in response to revised guidance from OWASP. The open source password management service has responded by increasing its default client-side iterations to 350,000 in a change that initially applies only to new accounts. The issue was downplayed in 2018 but its re-emergence this week, in the aftermath of the LastPass breach, has prompted Bitwarden to act. The public disclosure of the issue this week prompted cryptographer Nadim Kobeissi to point out that he and a team of colleagues had uncovered and reported (PDF) the same problem five years ago. The LastPass breach prompted Palant to investigate practices in this area among other password vault developers, uncovering shortcomings with Bitwarden’s approach in the process. Much worse yet, it had failed to migrate older accounts to even this suboptimal level, leaving them with just 5,000 rounds of protection. LastPass was faulted for applying fewer than the recommended number of iterations in hashing users’ encryption keys, performing only 100,000 in the best-case scenario. LastPass breach aftermath revisitedįailure to follow industry best practice on the number of hashing iterations becomes a live problem in the event of a password vault server breach, a calamity that recently befell LastPass. ![]() Hashing this password through an insufficient number of iterations leaves secrets at risk to potential brute-force attacks. Password vault data can only be decrypted using a key derived from a user’s master password. In response to this blog post, a Bitwarden user claimed an account they started using in 2020 operated with just 5,000 iterations (adding that increasing the count to 200,000 failed to cause a “noticeable slowdown”). Palant posted a technical blog post on the issue on Monday (January 23). And, much worse, older accounts were stuck with much lower security settings (unless they manually increased iterations on their settings).Ĭatch up on the latest encryption-related security news and analysis But security researcher Wladimir Palant has warned that, while this might sound impressive, the server-side iterations are ineffective. In this scenario, OWASP recommends using the PBKDF2 algorithm with random salts, SHA-256, and 600,000 iterations (a figure recently increased from the previous recommendation of 310,00 rounds).īitwarden said that its data is protected with 200,001 iterations – 100,001 iterations on the client side and a further 100,000 on the server side. The issue centers on the number of PBKDF2 hash iterations used to compute the decryption key for a user’s password vault. UPDATED Password vault vendor Bitwarden has responded to renewed criticism of the encryption scheme it uses to protect users’ secret encryption keys by enhancing the mechanism’s default security configuration. ![]() Password vault vendor accused of making a hash of encryption ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |