mirror of
https://github.com/Llewellynvdm/Tomb.git
synced 2024-11-05 04:47:56 +00:00
considerations on password bruteforce vulnerability on steghide
This commit is contained in:
parent
0e141abf57
commit
ba39aef673
@ -1,3 +1,28 @@
|
||||
# Vulnerability to password bruteforcing
|
||||
## Issue affecting keys used in steganography
|
||||
|
||||
An important part of Tomb's security model is to *make it hard for
|
||||
attackers to enter in possession of both key and data storage*: once
|
||||
that happens, bruteforcing the password can be relatively easy.
|
||||
|
||||
Protection from bruteforcing is provided by the KDF module that can
|
||||
be optionally compiled in `extras/kdf-keys` and installed.
|
||||
|
||||
If a key is buried in an image and then the image is stolen, the KDF
|
||||
protection does not works because *attackers can bruteforce easily
|
||||
using steghide dictionary attacks*: once found the password is the
|
||||
same for the steg crypto and the key crypto.
|
||||
|
||||
Users should keep in mind these issues when planning their encryption
|
||||
scheme and, when relying on steganography, keep the image always
|
||||
mixed in the same folder with many more images since that will be the
|
||||
multiplier making it slightly harder to bruteforce their password.
|
||||
|
||||
In most cases consider that *password bruteforce is a feasible attack
|
||||
vector on keys*. If there are doubts about a key being compromised is
|
||||
a good practice to change it using the `setkey` command on a secure
|
||||
machine, possibly while off-line or in single user mode.
|
||||
|
||||
# Versioning and stdin key
|
||||
## 1.5
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user