Consider that the master password hash is 256 bits of high-entropy. This makes it very hard to crack, even with PBKDF2 (or even 1 round of SHA1). The point of argon2 is to make low entropy master passwords hard to crack.
Unless there is a threat model under which this could actually be used to break any part of the security architecture, I don’t see the need.
A big congratulations to @Quexten for all the community work in developing Argon support and to Bitwarden developers and leadership for picking it up and running with it! A great example of the value proposition of open source and a project working closely with its community!
That is what I am thinking while I read the comments
I assume it is working on the web vault right now. FYI I read the apps and mobile etc can take a week to get updated.
I plan to hold off for a while before switching to learn about others experiences and I suggest a vault backup before.
Yes, please wait until you have the same version on all clients before making changes. Also be sure to backup vault before hand and remember that best protection is a strong/unique master password with 2FA.
@bw-admin For those of us who don’t fully understood the development & release cycle, can you explain how to tell whether a particular code change is present in a given release (in case it has not been mentioned explicitly in the release notes)? I have been assuming that if a commit has been merged into the main branch, then it would automatically be part of the next scheduled release — is this correct?
What does the full cycle look like? Is it PR → Commit → QA → Merge → Release?
I don’t understand if this double encryption already works even though it’s not listed in the changes list? Will it be introduced in the future?
Sorry for my English, I’m using google translator
I would assume if it’s not listed, it’s not yet implemented. This is a big change so I think it’s reasonable that the developers kick the tires on this to ensure the risk profile is low.
Love seeing this product and project actively developed by Bitwarden and the community after being with LastPass for well over a decade and watching it slowly grow stale and turgid as time went on.
PBKDF2 is FIPS-140 compliant. It’s also battle tested within Bitwarden. I can imagine these two reasons would have informed this decision for an initial roll out. Just guessing, of course.
Maybe because the clients haven’t been updated yet to support it? I’d assume after the roll out across the board they’ll flick a switch to make it default.
Also Argon2 using webassembly does not work in some specific environments (chromium on openbsd, ios in lockdown mode). Unless that changes, it can’t be made default.