Password vault vendor Bitwarden resoonds to encryption design flaw criticism

  • 26 January 2023
  • 1 comment
  • 45 views

Userlevel 7
Badge +9

Bitwarden has responded to renewed criticism of the encryption scheme it uses to protect users’ secret encryption keys by enhancing the mechanism’s default security configuration.

This issue centers on the number of PBKDF2 hash iterations used to compute the decryption key for a user’s password vault.

 

Note: OAWSP recommends using the PBKDF2 algorithm with random salts, SHA-256, and 600,000 iterations (a figure recently increased from the previous recommendation of 310,00 rounds).

 

Bitwarden said that its data is protected with 200,001 iterations. That is 100,001 iterations on the client side and a further 100,000 on the server side.

 

Security researcher Wladimir Palant has warned that, while this might sound impressive, the server-side iterations are ineffective. And, much worse, older accounts were stuck with much lower security settings (unless they manually increased iterations on their settings). Read more: https://palant.info/2023/01/23/bitwarden-design-flaw-server-side-iterations/

 


1 comment

Userlevel 7
Badge +20

Interesting article thanks for sharing.

Comment