· @linkdrop
56 followers · 1952 posts · Server botsin.space
Keywan Tonekaboni · @ktn
523 followers · 72 posts · Server social.heise.de

LUKS: Alte verschlüsselte Container unsicher? Ein Ratgeber für Updates

Angeblich konnte die französische Polizei einen LUKS-Container knacken. Kein Grund zur Panik, aber ein Anlass, Passwörter und LUKS-Parameter zu hinterfragen.

heise.de/news/Alte-LUKS-Contai

#argon #luks #linux #pbkdf2 #security #verschlusselung #cryptsetup

Last updated 2 years ago

Keywan Tonekaboni · @ktn
523 followers · 72 posts · Server social.heise.de
Mathis · @mathismatiker
15 followers · 68 posts · Server norden.social

Wenn jemand ein Linux-System mit LUKS verschlüsselt betreibt, könnte es sein, dass eine zu schwache (und veraltete) Key Derivation Function verwendet wird - vor allem, wenn die Installation schon etwas her ist.

Hier gibt's mehr Informationen und auch eine (von mir erfolgreich getestete) Anleitung zum Aktualisieren der LUKS-Einstellungen von @mjg59:
mjg59.dreamwidth.org/66429.htm

#linux #luks #verschluesselung #encryption #pbkdf2 #Argon2id

Last updated 2 years ago

꧁~Marumoko-ExtraFluff-Cea~꧂ · @alcea
29 followers · 2019 posts · Server pb.todon.de


Well, I'd call it
maxlaumeister.com/software/pag

"This tool uses the SubtleCrypto JavaScript API for its encryption. First, an encryption key is derived from the password using and a random with 100,000 rounds. Then the HTML is encrypted using "

#htmlcrypt #secure #pbkdf2 #salt #aes256

Last updated 2 years ago

CK's Technology News · @CKsTechNews
1816 followers · 3067 posts · Server cktn.todon.de
Wednesday Links · @wednesdaylinks
12 followers · 11 posts · Server foojay.social
CK's Technology News · @CKsTechNews
1762 followers · 2043 posts · Server cktn.todon.de

Grundvoraussetzung ist t.ly/YOF_

Was ihr aber ebenfalls unbedingt ändern solltet sind die Iterationen.
Bei Usern die schon vor 2019 Kunden waren steht dieser Wert noch auf 5000, wenn ihr den nie selbst geändert habt. Danach hat Lastpass den auf 100100 für Neukunden gesetzt. Empfohlen wird heutzutage 310000 und mehr.
Also setzt diese wenigstens auf 310000 siehe Bild

Und nutzt sichere Masterpasswörter!

#pbkdf2 #lastpass

Last updated 2 years ago

Jeremi M Gosney :verified: · @epixoip
2975 followers · 131 posts · Server infosec.exchange

Many of you have been asking for my thoughts on the breach, and I apologize that I'm a couple days late delivering.

Apart from all of the other commentary out there, here's what you need to know from a cracker's perspective!

Your vault is encrypted with using a key that is derived from your master password, which is hashed using a minimum of 100,100 rounds of PBKDF2-HMAC-SHA256 (can be configured to use more rounds, but most people don't). is the minimum acceptable standard in key derivation functions (KDFs); it is compute-hard only and fits entirely within registers, so it is highly amenable to acceleration. However, it is the only that is FIPS/NIST approved, so it's the best (or only) KDF available to many applications. So while there are LOTS of things wrong with LastPass, key derivation isn't necessarily one of them.

Using with the top-of-the-line RTX 4090, you can crack PBKDF2-HMAC-SHA256 with 100,100 rounds at about 88 KH/s. At this speed an attacker could test ~7.6 billion passwords per day, which may sound like a lot, but it really isn't. By comparison, the same GPU can test Windows NT hashes at a rate of 288.5 GH/s, or ~25 quadrillion passwords per day. So while LastPass's hashing is nearly two orders of magnitude faster than the < 10 KH/s that I recommend, it's still more than 3 million times slower than cracking Windows/Active Directory passwords. In practice, it would take you about 3.25 hours to run through rockyou.txt + best64.rule, and a little under two months to exhaust rockyou.txt + rockyou-30000.rule.

Keep in mind these are the speeds for cracking a single vault; for an attacker to achieve this speed, they would have to single out your vault and dedicate their resources to cracking only your vault. If they're trying 1,000 vaults simultaneously, the speed would drop to just 88 H/s. With 1 million vaults, the speed drops to an abysmal 0.088 H/s, or 11.4 seconds to test just one password. Practically speaking, what this means is the attackers will target four groups of users:

1. users for which they have previously-compromised passwords (password reuse, credential stuffing)
2. users with laughably weak master passwords (think top20k)
3. users they can phish
4. high value targets (celebs, .gov, .mil, fortune 100)

If you are not in this list / you don't get phished, then it is highly unlikely your vault will be targeted. And due to the fairly expensive KDF, even passwords of moderate complexity should be safe.

I've seen several people recommend changing your master password as a mitigation for this breach. While changing your master password will help mitigate future breaches should you continue to use LastPass (you shouldn't), it does literally nothing to mitigate this current breach. The attacker has your vault, which was encrypted using a key derived from your master password. That's done, that's in the past. Changing your password will re-encrypt your vault with the new password, but of course it won't re-encrypt the copy of the vault the attacker has with your new password. That would be impossible unless you somehow had access to the attacker's copy of the vault, which if you do, please let me know?

A proper mitigation would be to migrate to or , change the passwords for each of your accounts as you migrate over, and also review the MFA status of each of your accounts as well. The perfect way to spend your holiday vacation! Start the new year fresh with proper password hygiene.

For more password insights like this, give me a follow!

#lastpass #password #aes256 #pbkdf2 #kdf #hashcat #bitwarden #1password

Last updated 2 years ago

Soso · @sgued
41 followers · 146 posts · Server pouet.chapril.org

It would be great if breach was enough motivation to get standardized in the Web Cryptography APIs.
Otherwise web extensions are forced to rely on or use the much less secure

#pbkdf2 #wasm #argon2 #lastpass

Last updated 2 years ago

Yellow Flag · @WPalant
946 followers · 2996 posts · Server infosec.exchange

I published an article on the : palant.info/2022/12/23/lastpas

This is very serious, no matter what says. From the article:

“This makes it sound like decrypting the passwords you stored with LastPass is impossible. It also prepares the ground for blaming you, should the passwords be decrypted after all: you clearly didn’t follow the recommendations. Fact is however: decrypting passwords is expensive but it is well within reach. And you need to be concerned.”

Another conclusion from this article: is dead. Yes, you have that officially from me. If you still use it, feel free to go and fix that now.

#lastpassbreach #lastpass #pbkdf2

Last updated 2 years ago

Adam · @adam
264 followers · 701 posts · Server hax0rbana.social

Does anyone know of an open source core that implements ?

I checked opencores but didn't find it there...

opencores.org/projects?languag

Where else should I be looking?

#pbkdf2 #lazyweb #fpga #fpgas

Last updated 2 years ago

ITSEC News · @itsecbot
943 followers · 32667 posts · Server schleuss.online

Serious Security: MD5 considered harmful – to the tune of $600,000 - It's not just the hashing, by the way. It's the salting and the stretching, too! nakedsecurity.sophos.com/2022/ &order

#md5 #edf #cnil #pbkdf2 #hashing #law #cryptography

Last updated 2 years ago

· @dbread
15 followers · 86 posts · Server qoto.org

A good view on the computing power over the last 20 years.

When the standard was written in the year 2000 the recommended minimum number of iterations was 1,000, but the parameter is intended to be increased over time as CPU speeds increase. A Kerberos standard in 2005 recommended 4,096 iterations;[1] Apple reportedly used 2,000 for iOS 3, and 10,000 for iOS 4;[4] while LastPass in 2011 used 5,000 iterations for JavaScript clients and 100,000 iterations for server-side hashing.[5] In 2021, OWASP recommended to use 310,000 iterations for PBKDF2-HMAC-SHA256 and 120,000 for PBKDF2-HMAC-SHA512.

Source: en.wikipedia.org/wiki/PBKDF2

#pbkdf2 #hashing #crypto #cpu #power

Last updated 2 years ago

TOV · @textovervideo
130 followers · 489 posts · Server fosstodon.org

PHP offers many strandard algorithm, mainly using OpenSSL.

AES is a simmetric-key algorithm, a FIST 197 standard since 2001.

RSA is a public-key algorithm, an industry standard algorithm used in many products;

SHA is a hash function, in particular SHA-256 or SHA-512. Don't use SHA-1 for cryptography!

PBKDF2 is a key derivation algorithm that is a very popular algorithm (RFC 2898).

#php #aes #encrypt #decrypt #rsa #sha #pbkdf2

Last updated 3 years ago