You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "David Handermann (Jira)" <ji...@apache.org> on 2021/02/20 18:10:00 UTC
[jira] [Assigned] (NIFI-8246) Set Default Sensitive Properties
Algorithm with Improved KDF and Encryption
[ https://issues.apache.org/jira/browse/NIFI-8246?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
David Handermann reassigned NIFI-8246:
--------------------------------------
Assignee: David Handermann
> Set Default Sensitive Properties Algorithm with Improved KDF and Encryption
> ---------------------------------------------------------------------------
>
> Key: NIFI-8246
> URL: https://issues.apache.org/jira/browse/NIFI-8246
> Project: Apache NiFi
> Issue Type: Sub-task
> Components: Security
> Affects Versions: 1.13.0
> Reporter: David Handermann
> Assignee: David Handermann
> Priority: Major
>
> The default Sensitive Properties Algorithm specified using {{nifi.sensitive.properties.algorithm}} in {{nifi.properties}} has been {{PBEWITHMD5AND256BITAES-CBC-OPENSSL}} since early release versions. This default value relies on the {{NiFiLegacyCipherProvider}}, which is deprecated. The {{NiFiLegacyCipherProvider}} uses the MD5 hash algorithm with 1000 iterations and a random salt. This algorithm configuration also specifies AES with CBC, which does not provide Authenticated Encryption with Associated Data.
> Recent NiFi versions support the Argon2 secure hashing algorithm and AES in Galois/Counter Mode. NIFI-7668 introduces support for additional secure hashing algorithms along with support for AES-GCM. One of the options that incorporates an improved Key Derivation Function and AES-GCM should be set as the default sensitive properties algorithm in order to provide greater security for encryption of sensitive properties.
--
This message was sent by Atlassian Jira
(v8.3.4#803005)