-
Notifications
You must be signed in to change notification settings - Fork 274
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CBC mode is malleable #94
Comments
Backward compatibility is an issue, and the encryption is meant to protect Please describe an attack vector (specific to the protocol as implemented) Sent from my phone
|
Can you describe a scenario where a passive attack on the loopback network is possible but an active attack is not (except for the initial pairing which of course makes an FCFS attack by a local attacker against the password database possible)? |
None that I am currently aware of Sent from my tablet
|
I think an active attacker can use to truncate or change passwords in the set-login handler. |
That is a very good example of where an unauthenticated message fails. On Mon, Mar 25, 2013 at 10:31 AM, Matthias-Christian Ott <
|
KeePassHttp uses AES in CBC mode, which is malleable. The nonce based authentication doesn't prevent this either (if it is supposed to be a MAC, it is badly broken). Using AES in GCM mode prevents the respective attacks, makes the nonce based authentication unnecessary and can be easily added.
I'm not sure what the attack scenarios for KeePassHttp are (when used with PassIFox, it seems cryptography is only used to prevent other local users from accessing KeePassHttp which makes encryption unnecessary), but if encryption is used to protected against active attacks over the network, it definitely doesn't fulfil this purpose.
I can provide a patch if backwards compatibility is not an issue.
The text was updated successfully, but these errors were encountered: