Recent versions of Solr use 2048.
https://github.com/apache/lucene-solr/blob/branch_8_6/solr/core/src/java/org/apache/solr/util/CryptoKeys.java#L332

Thanks for your report.

On Fri, Feb 12, 2021 at 3:44 PM Mahir Kabir <mdmahiras...@vt.edu> wrote:

> Hello,
>
> I am a Ph.D. student at Virginia Tech, USA. While working on a security
> project-related work, we came across the following vulnerability in the
> source code -
>
> In file
>
> https://github.com/apache/lucene-solr/blob/branch_6_6/solr/core/src/java/org/apache/solr/util/CryptoKeys.java
> <
> https://github.com/apache/ranger/blob/71e1dd40366c8eb8e9c498b0b5158d85d603af02/kms/src/main/java/org/apache/hadoop/crypto/key/RangerKeyStore.java
> >
> (at
> Line 300) Key Size was set as 1024.
>
> *Security Impact*:
>
> < 2048 key size for RSA algorithm makes the system vulnerable to
> brute-force attack
>
> *Useful resource*:
> https://rules.sonarsource.com/java/type/Vulnerability/RSPEC-4426
> https://rules.sonarsource.com/java/type/Vulnerability/RSPEC-4426
>
> *Solution we suggest*:
>
> For RSA algorithm, the key size should be >= 2048
>
> *Please share with us your opinions/comments if there is any*:
>
> Is the bug report helpful?
>
> Please let us know what you think about the issue. Any feedback will be
> appreciated.
>
> Thank you,
> Md Mahir Asef Kabir
> Ph.D. Student
> Department of CS
> Virginia Tech
>

Reply via email to