We recently had a user question in regards to this thread, and wanted to 
add a quick update as I see we never followed up on this here on the 
group/mailing list.

These concerns were addressed as part of this commit:

commit 0d6f6ad282fd0d3fb581da9dcbafd33521eb67be
Author: James Tanner <>
Date:   Mon Mar 10 16:15:44 2014 -0500

    Implement new default cipher class AES256

Which addressed the primary concerns and recommendations listed above:

AES256 is now the default cipher (rather than plain AES).
PBKDF2 is now used for the hashing function, and errors are thrown if it's 
not available.
The data is encrypted and then MAC'd, as recommended.

If anyone still has a Vault-encrypted file using the 1.0 format (doubtful, 
since this was a year ago), they can use the rekey subcommand to rewrite 
their files with the newer 1.1 format (which has been the default since the 
above patch was merged). These files will have a first line which looks 
like this:

$ANSIBLE_VAULT;1.0;AES

Thanks!

-- 
You received this message because you are subscribed to the Google Groups 
"Ansible Project" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ansible-project/747777e1-c153-44c2-9da7-c9268fd0ee37%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to