Changes for version 2.17 - 2006-01-09
- -IMPORTANT NOTE: Versions of this module prior to 2.17 were incorrectly using 8 byte IVs when generating the old-style RandomIV style header (as opposed to the new-style random salt header). This affects data encrypted using the Rijndael algorithm, which has a 16 byte blocksize, and is a significant security issue.
- The bug has been corrected in versions 2.17 and higher by making it impossible to use 16-byte block ciphers with RandomIV headers. You may still read legacy encrypted data by explicitly passing the -insecure_legacy_decrypt option to Crypt::CBC->new().
- -The salt, iv and key are now reset before each complete encryption cycle. This avoids inadvertent reuse of the same salt.
- -A new -header option has been added that allows you to select among the various types of headers, and avoids the ambiguity of having multiple interacting options.
- -A new random_bytes() method provides access to /dev/urandom on suitably-equipped hardware.
Modules
Encrypt Data with Cipher Block Chaining Mode