in reply to Crypt::CBC, Blowfish and Salt problem
From the Crypt::CBC Changes file (emphasis added):
2.17 Mon Jan 9 18:22:51 EST 2006
-IMPORTANT NOTE: Versions of this module prior to 2.17 were incorrectly
using 8 byte IVs when generating the old-style RandomIV style header
(as opposed to the new-style random salt header). This affects data
encrypted using the Rijndael algorithm, which has a 16 byte blocksize,
and is a significant security issue.
The bug has been corrected in versions 2.17 and higher by making it
impossible to use 16-byte block ciphers with RandomIV headers. You may
still read legacy encrypted data by explicitly passing the
-insecure_legacy_decrypt option to Crypt::CBC->new().
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^2: Crypt::CBC, Blowfish and Salt problem
by samtregar (Abbot) on Feb 18, 2008 at 22:51 UTC | |
|
Re^2: Crypt::CBC, Blowfish and Salt problem
by Anonymous Monk on Feb 18, 2008 at 23:03 UTC | |
by almut (Canon) on Feb 18, 2008 at 23:27 UTC | |
by Anonymous Monk on Feb 18, 2008 at 23:37 UTC | |
by almut (Canon) on Feb 18, 2008 at 23:47 UTC | |
by Anonymous Monk on Feb 19, 2008 at 00:32 UTC | |
| |
by Anonymous Monk on Aug 19, 2008 at 20:51 UTC |