mirror of
https://github.com/adminsyspro/proxcenter-ui.git
synced 2026-04-24 22:15:58 +03:00
[GH-ISSUE #77] security: migrate encryption key derivation from SHA-256 to PBKDF2 #107
Labels
No labels
bug
enhancement
feature-request
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/proxcenter-ui#107
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @adminsyspro on GitHub (Mar 6, 2026).
Original GitHub issue: https://github.com/adminsyspro/proxcenter-ui/issues/77
Problem
The current encryption of secrets (Proxmox API tokens, SSH keys/passwords) uses a simple SHA-256 hash of
APP_SECRETas the AES-256-GCM key. This is fast to brute-force if the database is compromised.Expected
Use PBKDF2 or scrypt with a high iteration count to derive the encryption key from
APP_SECRET, making brute-force attacks significantly harder.Implementation notes
key_versionor prefix to encrypted fields to distinguish old vs new formatlib/encryption.ts(frontend), and any backend code that decrypts tokensPriority
Critical — if the SQLite database is leaked, secrets are vulnerable to offline brute-force.