<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Vaultwarden - Security Enhancement Tip]]></title><description><![CDATA[<p dir="auto">I wanted to share some information acquired from the school of hard knocks...</p>
<p dir="auto"><strong>Background</strong>: I found that VaultWarden uses PBKDF2-SHA-256 as its default encryption with 600,000 iterations.  One thing I discovered from security experts after being one of the many unlucky LastPass customers (victims of a hacking incident) was an added vulnerability in that everyone had the same number of KDF iterations based on default installation values.  While VW's 600,000 is far greater (and better because it requires more calculation resources) than my LastPass default setting, it is unfortunately the same for everyone - unless you change that:)</p>
<p dir="auto"><strong>Suggestions</strong>:</p>
<ul>
<li>
<p dir="auto">Set a random value &gt; 600,000 for the # of KDF iterations - Account Settings | Security | Keys.  Setting a value too high can make VW a bit unresponsive, so increase sensibly based on VW's suggested increments.</p>
</li>
<li>
<p dir="auto">OWASP publishes a recommendation on the # iterations for PBKDF2 encryption . Check periodically to make sure your value is equal to or greater than their recommendation.</p>
</li>
<li>
<p dir="auto">Note:  Each user will need to change this setting for their account.</p>
</li>
</ul>
<p dir="auto"><strong>Benefits</strong>:  A random KDF means a hacker has many more possible combinations to try.  With any luck they will move on to an easier target.  Staying at or above OWASP recommended iterations makes sense as well.</p>
<p dir="auto">Hope this helps.</p>
]]></description><link>https://forum.cloudron.io/topic/11194/vaultwarden-security-enhancement-tip</link><generator>RSS for Node</generator><lastBuildDate>Fri, 13 Mar 2026 18:10:03 GMT</lastBuildDate><atom:link href="https://forum.cloudron.io/topic/11194.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 28 Feb 2024 02:10:08 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Mon, 04 Mar 2024 17:34:56 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/andreasdueren" aria-label="Profile: andreasdueren">@<bdi>andreasdueren</bdi></a> Good question.  I don't know the answer.  Is there something similar for Argon2id parameters?</p>
]]></description><link>https://forum.cloudron.io/post/84416</link><guid isPermaLink="true">https://forum.cloudron.io/post/84416</guid><dc:creator><![CDATA[crazybrad]]></dc:creator><pubDate>Mon, 04 Mar 2024 17:34:56 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Mon, 04 Mar 2024 08:25:14 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/crazybrad" aria-label="Profile: crazybrad">@<bdi>crazybrad</bdi></a> said in <a href="/post/84118">Vaultwarden - Security Enhancement Tip</a>:</p>
<blockquote>
<p dir="auto">Note: Each user will need to change this setting for their account.</p>
</blockquote>
<p dir="auto">Isn't it enforced by the <code>PASSWORD_ITERATIONS</code> ENV which updates it for all users on login?</p>
]]></description><link>https://forum.cloudron.io/post/84360</link><guid isPermaLink="true">https://forum.cloudron.io/post/84360</guid><dc:creator><![CDATA[andreasdueren]]></dc:creator><pubDate>Mon, 04 Mar 2024 08:25:14 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Sun, 03 Mar 2024 13:15:03 GMT]]></title><description><![CDATA[<p dir="auto">I had changed to Argon2id a while ago. Since I was not sure about this needs to be done, but it was offered to me, I also rotated my encryption key as explained here: <a href="https://bitwarden.com/help/account-encryption-key/" target="_blank" rel="noopener noreferrer nofollow ugc">https://bitwarden.com/help/account-encryption-key/</a><br />
No matter if you just change the algorithm or rotate the key, you will need to log out on all your devices (desktop client, mobile client, browser extension) and login in again afterward.<br />
What I did had no impact on OTP.</p>
]]></description><link>https://forum.cloudron.io/post/84337</link><guid isPermaLink="true">https://forum.cloudron.io/post/84337</guid><dc:creator><![CDATA[nichu42]]></dc:creator><pubDate>Sun, 03 Mar 2024 13:15:03 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Sun, 03 Mar 2024 02:41:14 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/loudlemur" aria-label="Profile: LoudLemur">@<bdi>LoudLemur</bdi></a> I can answer some of your questions.  Yes, Account Settings → Security → Keys will allow you to change either the KDF value or change the algorithm to Argon2id.  These changes are for your entire account - so browser, desktop, smartphone app would all use the new algorithm/KDF value.  I believe you need to log in again if you have an active login whilst changing the algo/KDF.  OTP and passphrase I am not using just yet so I can't answer your question from experience.  But since these settings are per user, I am tempted to create a test user where I can try out Argon2id settings, and to your point, play with 1 or 2 OTP and passphrases and see the consequences.  If they are fatal, then simply delete the user, rinse and repeat until I get it right.</p>
]]></description><link>https://forum.cloudron.io/post/84317</link><guid isPermaLink="true">https://forum.cloudron.io/post/84317</guid><dc:creator><![CDATA[crazybrad]]></dc:creator><pubDate>Sun, 03 Mar 2024 02:41:14 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Sat, 02 Mar 2024 23:33:27 GMT]]></title><description><![CDATA[<p dir="auto">If you have a VaultWarden running, with passphrases already, would you need to create new passphrarses after changing the algorithm or the number of KDF iteration? Would it effect the OTP too? Also, if you have a browser extension for VW as well as a desktop VW, would it make a difference if you changed one whilst the other was online?</p>
<p dir="auto">Oh yeah, one more thing: How do we change the settings?<br />
Account Settings → Security → Keys</p>
<p dir="auto">Thanks for raising this topic.</p>
]]></description><link>https://forum.cloudron.io/post/84312</link><guid isPermaLink="true">https://forum.cloudron.io/post/84312</guid><dc:creator><![CDATA[LoudLemur]]></dc:creator><pubDate>Sat, 02 Mar 2024 23:33:27 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Sat, 02 Mar 2024 13:18:18 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/necrevistonnezr" aria-label="Profile: necrevistonnezr">@<bdi>necrevistonnezr</bdi></a> said in <a href="/post/84213">Vaultwarden - Security Enhancement Tip</a>:</p>
<blockquote>
<p dir="auto">Official help doc: <a href="https://bitwarden.com/help/kdf-algorithms/" target="_blank" rel="noopener noreferrer nofollow ugc">https://bitwarden.com/help/kdf-algorithms/</a></p>
</blockquote>
<p dir="auto">Thanks but having read that I'm still pretty much at a loss as to whether or not I should change from PBKDF2 SHA256 to Argon2id or not. <img src="https://forum.cloudron.io/assets/plugins/nodebb-plugin-emoji/emoji/android/1f937.png?v=21ee5037fec" class="not-responsive emoji emoji-android emoji--shrug" style="height:23px;width:auto;vertical-align:middle" title=":shrug:" alt="🤷" /></p>
<p dir="auto">For now I've just increased my KDF iterations up to the recommended minimum of 600000 (it was previously just 100000).</p>
<p dir="auto">Edit: but after reading through this as well, I think I will switch to Argon2id:</p>
<p dir="auto"><a href="https://community.bitwarden.com/t/pbkdf2-vs-argon2-which-is-better/59187" target="_blank" rel="noopener noreferrer nofollow ugc">https://community.bitwarden.com/t/pbkdf2-vs-argon2-which-is-better/59187</a></p>
<p dir="auto">Update: I switched to Argon2id and just opted the default settings (64 MiB of memory, iterate over it 3 times, and do so across 4 threads), which are significantly higher than the [current OWASP recommendations](current OWASP recommendations). I guess if I think it's too slow I could crank it down bit by bit toward (but no lower than) those recommendations.</p>
]]></description><link>https://forum.cloudron.io/post/84300</link><guid isPermaLink="true">https://forum.cloudron.io/post/84300</guid><dc:creator><![CDATA[jdaviescoates]]></dc:creator><pubDate>Sat, 02 Mar 2024 13:18:18 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Thu, 29 Feb 2024 12:52:56 GMT]]></title><description><![CDATA[<p dir="auto">Official help doc: <a href="https://bitwarden.com/help/kdf-algorithms/" target="_blank" rel="noopener noreferrer nofollow ugc">https://bitwarden.com/help/kdf-algorithms/</a></p>
]]></description><link>https://forum.cloudron.io/post/84213</link><guid isPermaLink="true">https://forum.cloudron.io/post/84213</guid><dc:creator><![CDATA[necrevistonnezr]]></dc:creator><pubDate>Thu, 29 Feb 2024 12:52:56 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Thu, 29 Feb 2024 12:11:17 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/nichu42" aria-label="Profile: nichu42">@<bdi>nichu42</bdi></a> I was going to ask the same.  I don't have any insights but would be interested in this as well.  In the interim I am going to ask some colleagues who are more involved in network security.</p>
]]></description><link>https://forum.cloudron.io/post/84211</link><guid isPermaLink="true">https://forum.cloudron.io/post/84211</guid><dc:creator><![CDATA[crazybrad]]></dc:creator><pubDate>Thu, 29 Feb 2024 12:11:17 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Thu, 29 Feb 2024 10:10:20 GMT]]></title><description><![CDATA[<p dir="auto">I was under the impression that the general recommendation is to move over to Argon2. Any insights on that?</p>
]]></description><link>https://forum.cloudron.io/post/84206</link><guid isPermaLink="true">https://forum.cloudron.io/post/84206</guid><dc:creator><![CDATA[nichu42]]></dc:creator><pubDate>Thu, 29 Feb 2024 10:10:20 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Thu, 29 Feb 2024 04:58:17 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/infogulch" aria-label="Profile: infogulch">@<bdi>infogulch</bdi></a> Looks like you are right.  I checked one of my VW backups and searching for the unique KDF iterations revealed that it is in fact stored in the database.  So the information I read after the LastPass breach was incorrect suggesting that a random value of similar size provided more protection that just using the default value.</p>
<p dir="auto">As I recall the default value at that time was 100,000 and OWASP was suggesting a much larger number.  In fact some long time users had much smaller KDF iterations, making the hacking effort minimal.</p>
<p dir="auto">So it looks like OWASP recommendation should be the minimum KDF iterations and to <a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> question earlier, perhaps increasing the value based on your own hardware devices in sensible increments.</p>
<p dir="auto">Thank you <a class="plugin-mentions-user plugin-mentions-a" href="/user/infogulch" aria-label="Profile: infogulch">@<bdi>infogulch</bdi></a> for correcting my misinformation.  But since my random # was higher than 600,000, I'm keeping it:)</p>
]]></description><link>https://forum.cloudron.io/post/84189</link><guid isPermaLink="true">https://forum.cloudron.io/post/84189</guid><dc:creator><![CDATA[crazybrad]]></dc:creator><pubDate>Thu, 29 Feb 2024 04:58:17 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Thu, 29 Feb 2024 03:06:04 GMT]]></title><description><![CDATA[<p dir="auto">This doesn't sound right. The number of iterations has to be stored in the database, and it is very often stored with the password hash. Changing to a "unique" number doesn't have any meaningful impact on security, aside from being big enough..</p>
<p dir="auto">The iteration count is designed to be a flexible way to increase the computational effort required for each cracking attempt. This is helpful because Moore's Law is quite real and instead of inventing a new hash every 2 years, users and operators can just bump the iteration count to maintain the same expected level of effort an attacker would have to expend with new hardware.</p>
]]></description><link>https://forum.cloudron.io/post/84187</link><guid isPermaLink="true">https://forum.cloudron.io/post/84187</guid><dc:creator><![CDATA[infogulch]]></dc:creator><pubDate>Thu, 29 Feb 2024 03:06:04 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Thu, 29 Feb 2024 01:59:52 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/jdaviescoates" aria-label="Profile: jdaviescoates">@<bdi>jdaviescoates</bdi></a> No problem.  Here is the reference to PBKDF2, but the rest of the "cheat sheet" is worth reading as well:  <a href="https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pbkdf2" target="_blank" rel="noopener noreferrer nofollow ugc">https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#pbkdf2</a></p>
]]></description><link>https://forum.cloudron.io/post/84186</link><guid isPermaLink="true">https://forum.cloudron.io/post/84186</guid><dc:creator><![CDATA[crazybrad]]></dc:creator><pubDate>Thu, 29 Feb 2024 01:59:52 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Wed, 28 Feb 2024 16:01:26 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/crazybrad" aria-label="Profile: crazybrad">@<bdi>crazybrad</bdi></a> said in <a href="/post/84118">Vaultwarden - Security Enhancement Tip</a>:</p>
<blockquote>
<p dir="auto">OWASP publishes a recommendation on the # iterations for PBKDF2 encryption . Check periodically to make sure your value is equal to or greater than their recommendation.</p>
</blockquote>
<p dir="auto">could you link to where that info is published?</p>
]]></description><link>https://forum.cloudron.io/post/84157</link><guid isPermaLink="true">https://forum.cloudron.io/post/84157</guid><dc:creator><![CDATA[jdaviescoates]]></dc:creator><pubDate>Wed, 28 Feb 2024 16:01:26 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Wed, 28 Feb 2024 13:08:42 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/girish" aria-label="Profile: girish">@<bdi>girish</bdi></a> Great question.  I'm not sure I have an answer.  I think it depends on the devices you are using Bitwarden/VaultWarden on.  The more CPU/RAM available, the less sensitive you will be to a higher KDF.  I did use 900K+ after the LastPass compromise and I did notice at times LastPass was slow.  I think the recommendation of increasing in ~100K increments is wise so if VW becomes slow, you can back off the last increment.</p>
]]></description><link>https://forum.cloudron.io/post/84150</link><guid isPermaLink="true">https://forum.cloudron.io/post/84150</guid><dc:creator><![CDATA[crazybrad]]></dc:creator><pubDate>Wed, 28 Feb 2024 13:08:42 GMT</pubDate></item><item><title><![CDATA[Reply to Vaultwarden - Security Enhancement Tip on Wed, 28 Feb 2024 10:07:34 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/crazybrad" aria-label="Profile: crazybrad">@<bdi>crazybrad</bdi></a> said in <a href="/post/84118">Vaultwarden - Security Enhancement Tip</a>:</p>
<blockquote>
<p dir="auto">Setting a value too high can make VW a bit unresponsive, so increase sensibly based on VW's suggested increments</p>
</blockquote>
<p dir="auto">Is there an upper limit (that one should not try to set)?</p>
]]></description><link>https://forum.cloudron.io/post/84129</link><guid isPermaLink="true">https://forum.cloudron.io/post/84129</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Wed, 28 Feb 2024 10:07:34 GMT</pubDate></item></channel></rss>