You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
I've identified a potential security concern in the DefaultValueEncryptor.java within the DBeaver project. The current implementation bypasses a more secure key derivation process, directly using the password as the key. This approach could weaken encryption strength and may not comply with best practices suggested by NIST SP 800-63B.
Describe the solution you'd like
It is recommended to enhance key derivation process by using a PBE function.
Additional context
Here is the reference from NIST SP 800-63B.
Verifiers SHALL store memorized secrets in a form that is resistant to offline attacks.
Memorized secrets SHALL be salted and hashed using a suitable one-way key derivation
function. Key derivation functions take a password, a salt, and a cost factor as inputs then
generate a password hash. Their purpose is to make each password guessing trial by an attacker
who has obtained a password hash file expensive and therefore the cost of a guessing attack high
or prohibitive. Examples of suitable key derivation functions include Password-based Key
Derivation Function 2 (PBKDF2) [SP 800-132] and Balloon [BALLOON]. A memory-hard
function SHOULD be used because it increases the cost of an attack. The key derivation function
SHALL use an approved one-way function such as Keyed Hash Message Authentication Code
(HMAC) [FIPS 198-1], any approved hash function in SP 800-107, Secure Hash Algorithm 3
(SHA-3) [FIPS 202], CMAC [SP 800-38B] or Keccak Message Authentication Code (KMAC),
Customizable SHAKE (cSHAKE), or ParallelHash [SP 800-185]. The chosen output length of
the key derivation function SHOULD be the same as the length of the underlying one-way
function output.
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
I've identified a potential security concern in the DefaultValueEncryptor.java within the DBeaver project. The current implementation bypasses a more secure key derivation process, directly using the password as the key. This approach could weaken encryption strength and may not comply with best practices suggested by NIST SP 800-63B.
Describe the solution you'd like
It is recommended to enhance key derivation process by using a PBE function.
Additional context
Here is the reference from NIST SP 800-63B.
The text was updated successfully, but these errors were encountered: