Se no seguro. David Leadbeater publicó el código POC para la fuerza bruta de hasta 64 bytes en un artículo titulado, algo irónicamente, encriptación Vim blowfish ... o por qué no debería lanzar su propia criptografía . La documentación de Vim ahora recomienda :
- The implementation of 'cryptmethod' "blowfish" has a flaw. It is possible
to crack the first 64 bytes of a file and in some circumstances more of the
file. Use of it is not recommended, but it's still the strongest method
supported by Vim 7.3 and 7.4. The "zip" method is even weaker.
Y, anteriormente:
The text in the swap file and the undo file is also encrypted. E843
However, this is done block-by-block and may reduce the time needed to crack a
password. You can disable the swap file, but then a crash will cause you to
lose your work. The undo file can be disabled without much disadvantage.
:set noundofile
:noswapfile edit secrets
Note: The text in memory is not encrypted. A system administrator may be able
to see your text while you are editing it. When filtering text with
":!filter" or using ":w !command" the text is also not encrypted, this may
reveal it to others. The 'viminfo' file is not encrypted.
Resumen:
- Si le preocupa la seguridad,
blowfish
no debe usarse. Usar en su blowfish2
lugar.
- Si bien
swap
y undo
archivos están encriptados, viminfo
no lo es.
Consejo no solicitado:
- Si le importa la seguridad, no utilice su propio cifrado . Y eso significa la
blowfish2
implementación también. Usa algo más, como GPG. El gnupg.vim
complemento puede ser útil. Parece que se mantiene . Se deshabilita viminfo
y el archivo de intercambio.