[ 
https://issues.apache.org/jira/browse/NIFI-1257?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15129095#comment-15129095
 ] 

ASF GitHub Bot commented on NIFI-1257:
--------------------------------------

Github user alopresto commented on a diff in the pull request:

    https://github.com/apache/nifi/pull/201#discussion_r51640371
  
    --- Diff: 
nifi-nar-bundles/nifi-standard-bundle/nifi-standard-processors/src/main/java/org/apache/nifi/processors/standard/util/crypto/OpenSSLPKCS5CipherProvider.java
 ---
    @@ -0,0 +1,211 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one or more
    + * contributor license agreements.  See the NOTICE file distributed with
    + * this work for additional information regarding copyright ownership.
    + * The ASF licenses this file to You under the Apache License, Version 2.0
    + * (the "License"); you may not use this file except in compliance with
    + * the License.  You may obtain a copy of the License at
    + *
    + *     http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +package org.apache.nifi.processors.standard.util.crypto;
    +
    +import org.apache.commons.lang3.StringUtils;
    +import org.apache.nifi.processor.exception.ProcessException;
    +import org.apache.nifi.security.util.EncryptionMethod;
    +import org.apache.nifi.stream.io.StreamUtils;
    +import org.slf4j.Logger;
    +import org.slf4j.LoggerFactory;
    +
    +import javax.crypto.Cipher;
    +import javax.crypto.NoSuchPaddingException;
    +import javax.crypto.SecretKey;
    +import javax.crypto.SecretKeyFactory;
    +import javax.crypto.spec.PBEKeySpec;
    +import javax.crypto.spec.PBEParameterSpec;
    +import java.io.IOException;
    +import java.io.InputStream;
    +import java.io.OutputStream;
    +import java.nio.charset.StandardCharsets;
    +import java.security.InvalidAlgorithmParameterException;
    +import java.security.InvalidKeyException;
    +import java.security.NoSuchAlgorithmException;
    +import java.security.NoSuchProviderException;
    +import java.security.SecureRandom;
    +import java.security.spec.InvalidKeySpecException;
    +import java.util.Arrays;
    +
    +public class OpenSSLPKCS5CipherProvider implements PBECipherProvider {
    +    private static final Logger logger = 
LoggerFactory.getLogger(OpenSSLPKCS5CipherProvider.class);
    +
    +    // Legacy magic number value
    +    private static final int ITERATION_COUNT = 0;
    +    private static final int DEFAULT_SALT_LENGTH = 8;
    +    private static final byte[] EMPTY_SALT = new byte[8];
    +
    +    private static final String OPENSSL_EVP_HEADER_MARKER = "Salted__";
    +    private static final int OPENSSL_EVP_HEADER_SIZE = 8;
    +
    +    /**
    +     * Returns an initialized cipher for the specified algorithm. The key 
(and IV if necessary) are derived using the
    +     * <a 
href="https://www.openssl.org/docs/manmaster/crypto/EVP_BytesToKey.html";>OpenSSL
 EVP_BytesToKey proprietary KDF</a> [essentially {@code MD5(password || salt) 
}].
    +     *
    +     * @param encryptionMethod the {@link EncryptionMethod}
    +     * @param password         the secret input
    +     * @param keyLength        the desired key length in bits (ignored 
because OpenSSL ciphers provide key length in algorithm name)
    +     * @param encryptMode      true for encrypt, false for decrypt
    +     * @return the initialized cipher
    +     * @throws Exception if there is a problem initializing the cipher
    +     */
    +    @Override
    +    public Cipher getCipher(EncryptionMethod encryptionMethod, String 
password, int keyLength, boolean encryptMode) throws Exception {
    +        return getCipher(encryptionMethod, password, new byte[0], 
keyLength, encryptMode);
    +    }
    +
    +    /**
    +     * Returns an initialized cipher for the specified algorithm. The key 
(and IV if necessary) are derived using the
    +     * <a 
href="https://www.openssl.org/docs/manmaster/crypto/EVP_BytesToKey.html";>OpenSSL
 EVP_BytesToKey proprietary KDF</a> [essentially {@code MD5(password || salt) 
}].
    +     *
    +     * @param encryptionMethod the {@link EncryptionMethod}
    +     * @param password         the secret input
    +     * @param salt             the salt
    +     * @param keyLength        the desired key length in bits (ignored 
because OpenSSL ciphers provide key length in algorithm name)
    +     * @param encryptMode      true for encrypt, false for decrypt
    +     * @return the initialized cipher
    +     * @throws Exception if there is a problem initializing the cipher
    +     */
    +    @Override
    +    public Cipher getCipher(EncryptionMethod encryptionMethod, String 
password, byte[] salt, int keyLength, boolean encryptMode) throws Exception {
    +        try {
    +            return getInitializedCipher(encryptionMethod, password, salt, 
encryptMode);
    +        } catch (IllegalArgumentException e) {
    --- End diff --
    
    During unit testing I was treating these differently. I guess in a 
production application the validation is not done any earlier, so it may not 
provide any value. I just figured that with crypto stuff, so much of it is 
opaque to a user that if I could separate out "you need to provide a good value 
for _X_" vs. "_magic_ went wrong" exceptions, that would be helpful. 


> Provide additional KDFs for EncryptContent
> ------------------------------------------
>
>                 Key: NIFI-1257
>                 URL: https://issues.apache.org/jira/browse/NIFI-1257
>             Project: Apache NiFi
>          Issue Type: Improvement
>          Components: Core Framework
>    Affects Versions: 0.4.0
>            Reporter: Andy LoPresto
>            Assignee: Andy LoPresto
>            Priority: Critical
>              Labels: encryption, security
>             Fix For: 0.5.0
>
>
> Currently, the two key derivation functions (KDF) supported are NiFi Legacy 
> (1000 iterations of MD5 digest over a password and optional salt) and OpenSSL 
> PKCS#5 v1.5 (a single iteration of MD5 digest over a password and optional 
> salt). 
> Both of these are very weak -- they use a deprecated cryptographic hash 
> function (CHF) with known weakness and susceptibility to collisions (with 
> demonstrated attacks) and a non-configurable and tightly coupled iteration 
> count to derive the key and IV. 
> Current best practice KDFs (with work factor recommendations) are as follows:
> * PBKDF2 with variable hash function (SHA1, SHA256, SHA384, SHA512, or 
> ideally HMAC variants of these functions) and variable iteration count (in 
> the 10k - 1M range). 
> * bcrypt with work factor of 12 - 16
> * scrypt with work factor of (2^14 - 2^20, 8, 1)
> The salt and iteration count should be stored alongside the hashed record 
> (bcrypt handles this natively). 
> Notes:
> * http://wildlyinaccurate.com/bcrypt-choosing-a-work-factor/
> * http://blog.ircmaxell.com/2012/12/seven-ways-to-screw-up-bcrypt.html
> * 
> http://security.stackexchange.com/questions/17207/recommended-of-rounds-for-bcrypt
> * 
> http://security.stackexchange.com/questions/3959/recommended-of-iterations-when-using-pkbdf2-sha256/3993#3993
> * 
> http://security.stackexchange.com/questions/4781/do-any-security-experts-recommend-bcrypt-for-password-storage/6415
>  
> * 
> http://web.archive.org/web/20130407190430/http://chargen.matasano.com/chargen/2007/9/7/enough-with-the-rainbow-tables-what-you-need-to-know-about-s.html
> * 
> https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2015/march/enough-with-the-salts-updates-on-secure-password-schemes/
> * http://www.tarsnap.com/scrypt.html
> * http://www.tarsnap.com/scrypt/scrypt.pdf



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to