[SECURITY] Insecure AES-GCM nonce usage in website_handlers #19
Labels
No labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
geomind_code/my_fs#19
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The
decrypt_blockfunction insrc/server/website_handlers.rsuses the encryption key as the nonce for AES-GCM decryption.Risk: Reusing the key (or even a subset of it) as a nonce is a major cryptographic failing in AES-GCM. It can lead to the "Forbidden Attack," allowing an attacker to recover the authentication key or decrypt other blocks if the same key/nonce pair is used more than once.
Fix: Ensure the
meta::Blockstructure stores a unique, randomly generated nonce alongside the key and block ID.