

Critical Vulnerabilities In Web-Based Password Managers Found 114
An anonymous reader writes A group of researchers from University of California, Berkeley, have analyzed five popular web-based password managers and have discovered vulnerabilities that could allow attackers to learn a user's credentials for arbitrary websites. The five password managers they analyzed are LastPass, RoboForm, My1Login, PasswordBox and NeedMyPassword. "Of the five vendors whose products were tested, only the last one (NeedMyPassword) didn't respond when they contacted them and responsibly shared their findings. The other four have fixed the vulnerabilities within days after disclosure. 'Since our analysis was manual, it is possible that other vulnerabilities lie undiscovered,' they pointed out. They also announced that they will be working on a tool that automatizes the process of identifying vulnerabilities, as well as on developing a 'principled, secure-by-construction password manager.'"
KeePass? (Score:4, Interesting)
I'd be really curious to here there opinions on KeePass, which isn't web-based but certainly in the same category.
Re:KeePass? (Score:5, Informative)
I'd probably say KeePass is as secure as things get, since it doesn't use the Web in any way, shape, or form.
What I'd like to see with password apps that use a cloud provider for backend storage, (be it 1Password, mSecure, or so on), would be a keyfile that is manually transferred between devices, and never is put on the cloud backend. This way, if/when the cloud provider is hacked, the password file is not just protected by the passphrase, but by a keyfile that an attacker would have to compromise a physical device to get.
Re: (Score:3)
Hate responding to my own posts, but adding another idea... Each endpoint device has its own private key... so the data that is stored on the backend cloud provider would be conventionally encrypted, but would be unlockable by any key in the access list, similar to a PGP attachment that lists multiple public keys. That way, one can add and remove devices by using their key, and no common file needs to be shared.
Re:KeePass? (Score:5, Funny)
Re: (Score:2)
I have a YubiKey NEO that works perfectly with LastPass, both on desktop systems via USB, and on my mobile device via NFC. The key has internal non-volatile storage but no battery; when it's plugged in and used, it atomically reads from storage; uses the input from storage as a salt to generate a unique one-time password (a long ASCII string); transmits the password to the host device; then updates the non-volatile storage with some magic to ensure that the next one-time password is unique, unguessable and
Re: (Score:3, Informative)
The "magic to ensure that the next one-time password is unique" is a counter, an integer one higher than the previous time.
The checksum of (counter + internal private key) is what results in the final 32 chars of the sequence (the first 12 being your userid).
Re: (Score:2)
An attacker would need my LastPass password (which is not, itself, stored in my LastPass vault); my physical YubiKey; and the knowledge to use both in tandem, in order to gain access to my LastPass account.
Yes, because the Lastpass website enforces this two factor scheme.
On the other hand, once it's open on your computer: the entire database is available for RAM-scraping malware to take a peek.
Or to decrypt using only the master password, since, as I understand: it's just the Lastpass website that req
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
You can do this with KeepPass, Google Drive, and a sneakernet'd keyfile. Move the keyfile to a non-synced location on each common computer (and / or carry it with you on your phone or USB drive), stick the KP database in Google Drive, viola. Secure access to everything from everywhere.
Re: (Score:2)
How about no keyfile at all [masterpasswordapp.com]? Keeping backups of a keyfile in secure locations, syncing a keyfile between multiple devices and handhelds securely and without conflict, etc all needlessly complicate password management and eventually affect overall security. Also, if an authority obtains your keyfile through any form of search, they are legally within their right to force you to provide the key to unlock it. Not so if there is no encrypted vault.
Re: KeePass? (Score:3)
That is very dangerous: when the master password is trivial to reverse from the site password, an attacker could easily set up a hoax site, get your site password and reverse your master key. Master Password above uses a hmac-sha-256 of a 64 byte master key which is something you can't just reverse. It also uses an expensive scrypt based salted key derivation to get that key from your master password, which is also something you can't reverse.
Re: (Score:2)
This way, if/when the cloud provider is hacked, the password file is not just protected by the passphrase, but by a keyfile that an attacker would have to compromise a physical device to get.
If you believe Apple, that's how their iCloud Keychain [apple.com] works. They say they can't decrypt your keychain, because the keys are embedded in your phone and never transmitted.
Re: (Score:2)
Re:KeePass? (Score:4, Funny)
Which in Dutch --translated for the occasion to English-- would mean 'Ouch! Tom Ate Ice".
Re: (Score:1)
No, but automate is.
Re:KeePass? (Score:4, Informative)
I have KeePass installed on my computers and KeyPassDroid on my phone and tablet. The file is shared between them all using Dropbox. This way, if I change it one place it's available at all the others automagically, and in case it gets corrupted I have a 30-day history of changes at Dropbox's site. I've had no problems, I like its built-in and configurable password generator, and it works a treat with the KeeFox plugin for Firefox.
(YMMV in that you may have issues with Dropbox, but for me, it works.)
Re: (Score:2)
I do the same, except I use Google Drive as my "sharepoint" for the file. After looking at a bunch of the "costs money" ones, Keepass just made the most sense.
Re: (Score:2)
same here - only I don't try to keep it in sync with other devices (don't want changes I make to my PCs keepass db to be automatically synced to my phone that might be stolen)(I might be going a little too paranoid here)
I also use Mozy for the cloud storage, as it encrypts everything stored (with a different key) and it has history.
Keepass is awesome, my only worry is that I forget which file I used as the encryption 2nd part and delete it one day!
Re: (Score:1)
Re: (Score:2)
From all reports, Dropbox is compromised by default. However, I also figure they have an easier way to get into any account I have via NSL or preexisting backdoor than to go crack my KeePass file. I'm just trying to keep everyone else out.
Re: (Score:1)
I have no issues with KeePass, but I do wish to note that Password Safe [sourceforge.net] is good enough for Bruce Schneier [wikipedia.org], which is more than good enough for me.
Re: (Score:2)
KeePass has mac/pc/android clients. Password safe (which I used to use) does not. The PC client is great, but the mac options in particular suck huge donkey balls.
Re: (Score:2)
My wife tried the elephant one on her mac (I forgot the name, but there's an elephant in the logo). It was awful.
This was a while ago. There may be better now.
I couldn't find a good Android one. I don't know if that has changed either, since I switched to KeePass.
Re: (Score:2)
I think it's literally called "Elephant" (as in, "an elephant never forgets").
(Honestly, at first I thought you might be thinking of Evernote (apologies!), but then I saw your UID & figured that was very unlikely...)
Re: (Score:2)
It pulls in a lot of mono libs on Linux, I see. Yuck!!
Re:KeePass? (Score:5, Informative)
Re: (Score:2)
Will look into it. Thanks!
Re: (Score:2)
KeePass works well.
The logic is sound. You own your password file, it is encrypted and integrity checked. You can keep it somewhere shared (like google drive or dropbox) so each of your client machines has a copy for redundancy, but changes are shared and available to all devices.
I have a home PC, a work PC and Mac Book and an Android phone all using the same keepass file and it works great.
Web based services make no sense whatsoever. Why trust a website company when you don't have to?
Re: (Score:3)
You're telling us not to trust a web based service, but then tell us you keep your data shared like google drive or dropbox? I see no appreciable difference in practice there. Lastpass is essentially Keepass + a specialized dropbox-type service. Your advice is especially ironic given the spotty security dropbox is known for [zdnet.com].
At some point, you have to make informed decisions about the tradeoffs between security and convenience. For me, using Lastpass is a convenient way to synchronize the strongest possi
Re: (Score:2)
>You're telling us not to trust a web based service, but then tell us you keep your data shared like google drive or dropbox? I see no appreciable difference in practice there. Lastpass is essentially Keepass + a specialized dropbox-type service. Your advice is especially ironic given the spotty security dropbox is known for [zdnet.com].
The problem is not in the remote storage. It's in the local client that does the work to turn your clicks and typing into a secured file that doesn't need to trust the st
Re: (Score:2)
>You're telling us not to trust a web based service, but then tell us you keep your data shared like google drive or dropbox? I see no appreciable difference in practice there. Lastpass is essentially Keepass + a specialized dropbox-type service. Your advice is especially ironic given the spotty security dropbox is known for [zdnet.com].
The problem is not in the remote storage. It's in the local client that does the work to turn your clicks and typing into a secured file that doesn't need to trust the storage medium to do anything except store.
The 'web integration' puts your password manager in a really bad place - in the browser. What could possibly go wrong? Surely no one attacks web browsers.
Yep, that's very true. At this point, though, most attacks are directed at Java, Flash, or the browser's Javascript interpreter. These vectors are still dangerous because of potentially malicious content being served by untrustworthy servers. I uninstalled Flash some time ago, and make good use of noscript to prevent untested scripts from running, as that's still a dangerous attack vector. Keep in mind that plugins are run in separate processes, which affords some natural protection and isolation. Note
Re: (Score:2)
Outside of a browser, with a separate-from-the-browser password keeper like KeePass I see three primary malware attack vectors
1) Keyboard Logging
2) Snarfing the clipboard as you copy and paste the password
3) Privilege escalation and attacking the keeper directly
But #1 and #2 are pretty universal, whereas #3 is software version specific.
I would much prefer a hardware solution, where the plaintext password never existed on the primary computer, but instead existed in separate hardware (like a USB device or sm
Re: (Score:2)
And I'm gonna keep using LastPass. Since I never used the bookmarklet thing, it seems unlikely I'm at any risk for exploit, and in any case, LastPass fixed that issue.
Could there be others? Oh sure. There could be issues with anything. My glass of water MIGHT be the one to contain something to make me sick. My car MIGHT have a defect. Windows 7 MIGHT BSOD three times in a night. Oh wait. That's not a might. That's a definite. Never mind.
I'm going to keep using LastPass.
Re: (Score:3)
I'd be really curious to here there opinions on KeePass, which isn't web-based but certainly in the same category.
i've always had trouble with putting all my apples in the same basket, so i never touched things like keepass, kisskiss nor any other keyring. that there's folks doing that *OVER THE WEB* is staggering. if i weren't speechles right now i'd say they deserve being raped in their most intimate identity.
Surprise (Score:3)
The web in insecure, don't store passwords in the web. Use keepassx [keepassx.org] instead. You get it for Windows and OS X on the site, for Linux using package managers, for Android on the Play Store and maybe also for iOS (look for MiniKeePass).
Re: (Score:1)
To claim that it is impossible or futile to store passwords on the web is missing the point. The nature of the content is immaterial. If you are of the opinion that passwords can't be securely stored on the web, then you must also believe that NO content can securely be stored on the web -- in which case, have fun living in the dark ages, where the only thing you can do with the web is share information that you're fine with being released to the general public.
I, on the other hand, really like it when I ca
Re:Surprise (Score:5, Insightful)
Re: (Score:2, Insightful)
I think there's a difference between "being willing to accept the risk of my credit card(s) being compromised on the internet" and "being willing to accept the risk of every account password I have being compromised on the internet". I essentially have insurance to help me recover losses from my credit cards. Having every bank account and retirement account drained by an enterprising criminal with access to all of my account and personal details is on a completely different risk level.
Let's assume for the moment that you're correct and that there is a difference in risk level between submitting your name, address, email, credit card number, CVV2 (these are the fields required for a standard online order form), and storing all your passwords on the Internet.
Let's assume someone actually does intercept your order form, and gets all the above-mentioned personal data on you (perhaps because the company processing your order stored all your order info in an unprotected SQL database). Many peo
Re: (Score:2, Insightful)
Your entire argument is based on a false premise.
Food For Thought - It is easy to develop a simple algorithm to remember passwords and thus remember different passwords to any website. Essentially, unless you are being tortured, no one will be able to know your algorithm for setting passwords (you store the algorithm in your head). Your algorithm may appear "weak" if someone knew it but no one has to know it (i.e. you could use the first 5 letters in the web address to seed your algorithm).
Re: (Score:1)
Not really. Your algorithm can deal with these requirements fairly easily and you can guess your password more than once (failed password means you couldn't use your algorithm 100%, so proceed to "alternate") OR look up what the "rules" where for creating a password OR reset your password.
A decently well defined and broad algorithm should handle most of these issues without a problem. I know mine does.
Basically, make sure your algorithm will always result in the use of a capital, a number and a special cha
Re: (Score:2)
Re: (Score:2)
I have a simple text file with a mnemonic for my password for each site I use. I have half a dozen or so passwords - not so many I can't remember each, but too many to keep straight which is for which site. So I might have a note that this bank uses my strong financial password, while that one uses my weak financial password, and that store uses my merchant password, and so on.
There's nothing recoverable from that file.
Re: (Score:3)
Done right, storing passwords on the web can be decently secure, especially if there is some part of the decryption key (be it a public key, a secondary authenticator, or a keyfile) that is not available to the attacker, in combination with the master passphrase.
I'd say the best implementation of this would be a utility that piggybacked on the cloud provider of choice, so one isn't limited to GDrive, Dropbox, Box, Skydrive, iCloud, or others. The utility would ask for permission just for its own directory
Re: (Score:3)
Re: (Score:2, Interesting)
The web in insecure, don't store passwords in the web. Use keepassx [keepassx.org] instead. You get it for Windows and OS X on the site, for Linux using package managers, for Android on the Play Store and maybe also for iOS (look for MiniKeePass).
I don't subscribe to this absolutist position. Web based password managers like Lastpass certainly have their uses and are extremely convenient when tons of forums and websites require you to have accounts. They make it easy to login effortlessly and across multiple computers. They are also safer in that they let you have unique passwords for every account.
That being said, the smart thing to do is to:
1) Not save any bank account / Money related passwords on a web based password manager. Heck, I wouldn't eve
For that reason... (Score:5, Funny)
Re: (Score:3)
Passwords all the way down
Re: (Score:2)
That's actually not a bad idea!
Suppose you used 5 different password managers, and each one stored a password. Then, a password manager manager would glue the 5 passwords together to get the final password. Or maybe hash them to produce the final password. That way, when one password manager is cracked, it would not be enough to get your password.
Of course, then the password manager manager could be cracked. Hmm.... so you would need 5 password manager managers. Which would require a single password ma
Storing cloud passwords in the cloud? (Score:5, Insightful)
.
Eliminate the middle-man, go wholesale.
Re:Storing cloud passwords in the cloud? (Score:5, Informative)
In the case of LastPass at least, the passwords are encrypted locally and then sent to the server for storing. Your only possibility there would be searching through and finding stores with weak passwords, or finding a crack in the encryption. Otherwise, the attacks have to take place on the end user side.
Re:Storing cloud passwords in the cloud? (Score:4, Interesting)
The problem is that there is an conflict between a password suitable enough for protection (i.e. 20+ characters), and something quick enough to access in a short time.
mSecure addresses this in an interesting way -- they cache the extra long sync password used for the cloud. The password that is used to encrypt the synchronized database that sits in iCloud or DropBox is different from the app's passphrase. Since most phones have decent innate protection, it is not impossible, but very difficult to dump the data on a locked device [1], so one can have a fairly easy to type in PIN on the device, but the synchronized backend file is protected with a much longer (and more secure) passphrase.
[1]: iOS on the iPhone 4 and up always encrypts. Android since 3.x has the option of using md-crypt and encrypting the /data partition, then using another tool to separate the password asked on boot to decrypt that partition from the screen locker password.
Re: (Score:2)
The local password is cached for LastPass as well. You can either have to re-enter it each time you open the browser, after a period of time, or only once. Having had a work laptop that had personal passwords stored in it taken back when I was laid off, I realized I needed a way to store passwords such that I can still store passwords but in a way it doesn't rely on a single system.
the most secure password manager (Score:1)
A zipped text file, that is the most secure password manager there is
Re: (Score:2)
Do they have a sense of humor?
Question i have Roboform (Score:1)
Re: (Score:2)
It's all saved on your PC/Mac/USB stick unless you purchase a yearly RoboForm everywhere licence and tell it to sync to the cloud. I think that's the only way to use it from a phone as well.
Web-based password managers (Score:1)
TL;DR - (from a security guy) (Score:5, Interesting)
From page 7 of the paper (http://devd.me/papers/pwdmgr-usenix14.pdf):
- LastPass, RoboForm and My1login all had "bookmarklet" vulnerabilities (used if you share passwords across the web - shudder)
- LastPass, Roboform and NeedMyPassword all had "web" vulnerabilities
- My1login and PasswordBox both had "authorization" vulnerabilities
- LastPass and RoboForm both had "UI" vulnerabilities
The other thing I wondered at was why the special mention of "creating tools to automatically identify such vulnerabilities" when there's a bunch of packages that already do that...until I looked on page 14 and saw the list of US government grants that sponsored this paper, plus mention of some Intel funding. (If you want the money to flow, first identify the problem...)
Not surprising (Score:2)
This illustrates exactly why you keep all your important data in-house and preferably offline.
Re: (Score:2)
I don't use LastPass for more important sites like banking (or even email), but I certainly use it to generate and store a secure password for all the random web forums I visit.
Slightly misleading, fearmongery headline (Score:5, Informative)
This was on HN a few days ago; my comment there was the same: In the case of LastPass, the headline is misleading and a little fearmongery.
There were two issues with LastPass and NEITHER affected its storage of persistent passwords, that is, neither affected the feature the vast majority of us use passwords managers for!
One concerned a targeted attack against one-time passwords (OTP), the other concerned bookmarklets, which are used by less than 1% of the user base, according to LastPass. Personally I didn't know either feature existed until I read the LastPass blog entry about these two vulnerabilities.
A truer headline would have been Vulnerabilities found in less-frequently used features of LastPass; persistent site password storage unaffected".
Re: (Score:1)
Read page seven of the paper, you're completely wrong. http://devd.me/papers/pwdmgr-usenix14.pdf
They had one job (Score:4, Informative)
A "web based password manager" has one job - keeping the passwords secure. That's all it does. If anyone easily finds a vulnerability in that, the service is a failure.
brainpower (Score:3, Insightful)
Re: (Score:2)
Re: (Score:3)
I use bash.org to store my passwords.
Passpack? (Score:1)
Oblig XKCD (Score:1)
Cloud vs local - Still prefer local... (Score:1)
Well done, Lastpass! (Score:1)
2FA+SRP (Score:1)
Re: (Score:1)
Automatize? Seriously?
I think the word you are looking for is automate.
Not as idiotic as a word I once saw in a Slashdot story (burglarsize, I think it was), but close.
Yup.. that one belongs with "orientated" and other oddities of the modern "High Edication" system..