Package: bcrypt Version: 1.1-8.1+b1 The bcrypt package is 15 years outdated, with no updates. The last update was 2002-09-13: https://sourceforge.net/projects/bcrypt/files/.
In addition, bug #700758 mentions that bcrypt does not use a secure form of encryption, in that it uses the Blowfish algorithm. Indeed, Blowfish is a 64-bit cipher, and is vulnerable to the Sweet32 Birthday attack. See https://sweet32.info/. Further, it uses Blowfish in ECB mode (as bug #700758 mentions). ECB mode retains structure of the file that it encrypts, and should never be used as a serious mode of encryption. Continuing, aside from using an ECB mode, the encryption is not authenticated using a message authentication code (MAC). As such, the encrypted data is subject to bit flipping attacks, replay attacks, and other vulnerabilities. If that's not bad enough, the term `bcrypt' is actually a password hashing function with a tunable parameter as a CPU cost. However, this package is not doing password hashing, but instead doing only Blowfish encryption. See https://en.wikipedia.org/wiki/Bcrypt versus https://en.wikipedia.org/wiki/Blowfish_(cipher). Blowfish is not bcrypt, and bcrypt is not Blowfish. In the manpage, it provides http://www.counterpane.com/bfsh-koc.zip as a link to download the original Blowfish sources, but that link redirects to https://www.globalservices.bt.com/uk/en/products_category/security_and_risk_management. Further, the domain to the email address of <jshel...@ictransnet.com> is no longer valid. Due to the bugs: * Using Blowfish * Using ECB mode * Not using authenticated encryption * Manpage outdated * Package incorrectly named (confusing with the password hashing alg.) * Sources outdated This package should just be dropped from the repositories. -- . o . o . o . . o o . . . o . . . o . o o o . o . o o . . o o o o . o . . o o o o . o o o
signature.asc
Description: PGP signature