Hello!
First and foremost, I would like to express my sincere gratitude for your contributions to this project.
Description:
I have identified a security vulnerability in BitDust project's about PBKDF issues.
Insufficient Iteration Count for Key Derivation: The number of iterations used for key derivation in PBE is less than the recommended minimum of 1,000 iterations. This makes the derived keys more susceptible to brute-force attacks.
Use of Constant or Zero Salts: The application uses a constant, default zero salt value for key derivation in PBE. Salts are critical for ensuring that the output of a key derivation function is unique even when the same password is used multiple times. Using a constant salt negates this security feature and makes the system vulnerable to certain types of cryptographic attacks, such as rainbow table attacks.
Do not use fewer than 1,000 iterations for encryption (PBE)
Increase Iteration Count: Update the PBKDF function to use a higher iteration count. Conduct performance tests to determine the optimal count that balances security with usability.
Random Salt Generation: Implement a secure random salt generator for each PBE operation and ensure that salts are stored or transmitted securely alongside the ciphertext.
Immediate attention to this issue is recommended to maintain the privacy and security of BitDust users.
Hello! First and foremost, I would like to express my sincere gratitude for your contributions to this project.
Description:
I have identified a security vulnerability in BitDust project's about PBKDF issues.
Locations:
low iterations https://github.com/bitdust-io/devel/blob/master/bitdust_forks/Bismuth/bismuthclient/bismuthcrypto.py#L215 https://github.com/bitdust-io/devel/blob/master/bitdust_forks/Bismuth/bismuthclient/simplecrypt.py#L149
default zero salt https://github.com/bitdust-io/devel/blob/master/bitdust_forks/Bismuth/bismuthclient/bismuthcrypto.py#L218 https://github.com/bitdust-io/devel/blob/master/bitdust_forks/Bismuth/bismuthclient/simplecrypt.py#L149
References:
CWE-330: Use of Insufficiently Random Values CWE-326: Inadequate Encryption Strength
Recommendations:
Immediate attention to this issue is recommended to maintain the privacy and security of BitDust users.