TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

KeePass2 v 2.34 to fix update security problem

73 pointsby SNvD7vEJalmost 9 years ago
From the KeePass site: http:&#x2F;&#x2F;keepass.info&#x2F;help&#x2F;kb&#x2F;sec_issues.html#updsig<p><i>In order to prevent a man in the middle from making KeePass display incorrect version information (even though this does not imply a successful attack, see above), the version information file is now digitally signed (using RSA-2048 and SHA-512).<p>KeePass 2.34 and higher only accept such a digitally signed version information file. This solution is more secure than just using HTTPS, because it guarantees version information safety even when the webserver is compromised (the private key for signing the version information is not stored on the webserver).</i><p>Downloads page: http:&#x2F;&#x2F;keepass.info&#x2F;download.html<p>Edit: The update has NOT yet been released, as of (CET 11:30 2016-06-06)

7 comments

dchestalmost 9 years ago
This is a partial fix, but it&#x27;s not enough. An attacker performing man-in-the-middle attack can respond with the previous version of &quot;version information file&quot;, preventing the update.<p>Imagine if there&#x27;s a vulnerability in one version of KeePass2, and the fix is available for it. MiTM attacker sends the previous version so that the app doesn&#x27;t know that there&#x27;s an update, and the attacker has more time to use the vulnerability.<p>HTTPS prevents this. They should do both.
评论 #11845776 未加载
评论 #11848002 未加载
评论 #11850479 未加载
评论 #11845744 未加载
评论 #11845754 未加载
Sephralmost 9 years ago
&gt; Downloads page: <i>http</i>:&#x2F;&#x2F;keepass.info&#x2F;download.html<p>I still see a glaring MitM vulnerability…<p>Until the author actually switches to HTTPS, network operators can simply hijack the original downloads page in the first place. This update is barely a mitigation.<p>If he wants more ad revenue, his only option is to find another ad network. Eventually someone else is going to start hosting a popular fork on a different HTTPS site if he keeps stubbornly ignoring this issue.
评论 #11845837 未加载
评论 #11845838 未加载
cypharalmost 9 years ago
Why not just switch to using The Update Framework (TUF)[1]. It solves many, many, many attacks against updating systems and we really should be using it everywhere.<p>[1]: <a href="https:&#x2F;&#x2F;theupdateframework.github.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;theupdateframework.github.io&#x2F;</a>
评论 #11848820 未加载
3onycalmost 9 years ago
Why don&#x27;t they put the update file on a subdomain with HTTPS enabled? No ad revenue lost that way.
评论 #11845819 未加载
VoidWhispereralmost 9 years ago
My question is: Would they have released this update if the person who came forward about the fact that KeePass said that they wouldn&#x27;t fix it didn&#x27;t?
评论 #11845704 未加载
评论 #11845752 未加载
BerSerKeralmost 9 years ago
Since the post about this problem a few days ago I&#x27;ve stopped using KeePass and began using Password Safe. Good program.
pieter_mjalmost 9 years ago
Allowing these type of programs to autonotify of updates and self-update should be considered bad practice and a high security risk.<p>Why risk a malicious MITM-ed update? The keepass site should just provide portable zips and off-site hashes and sigs for verification.