tomb

the crypto undertaker
git clone git://parazyd.org/tomb.git
Log | Files | Refs | README | LICENSE

commit ba39aef6738f8a1c6ce9ba817cbd99c59eb7a6b0
parent 0e141abf5746635a128aac4b170f8ebddd68d894
Author: Jaromil <jaromil@dyne.org>
Date:   Sun, 23 Nov 2014 15:31:14 +0100

considerations on password bruteforce vulnerability on steghide

Diffstat:
MKNOWN_BUGS.md | 25+++++++++++++++++++++++++
1 file changed, 25 insertions(+), 0 deletions(-)

diff --git a/KNOWN_BUGS.md b/KNOWN_BUGS.md @@ -1,3 +1,28 @@ +# Vulnerability to password bruteforcing +## Issue affecting keys used in steganography + + An important part of Tomb's security model is to *make it hard for + attackers to enter in possession of both key and data storage*: once + that happens, bruteforcing the password can be relatively easy. + + Protection from bruteforcing is provided by the KDF module that can + be optionally compiled in `extras/kdf-keys` and installed. + + If a key is buried in an image and then the image is stolen, the KDF + protection does not works because *attackers can bruteforce easily + using steghide dictionary attacks*: once found the password is the + same for the steg crypto and the key crypto. + + Users should keep in mind these issues when planning their encryption + scheme and, when relying on steganography, keep the image always + mixed in the same folder with many more images since that will be the + multiplier making it slightly harder to bruteforce their password. + + In most cases consider that *password bruteforce is a feasible attack + vector on keys*. If there are doubts about a key being compromised is + a good practice to change it using the `setkey` command on a secure + machine, possibly while off-line or in single user mode. + # Versioning and stdin key ## 1.5