Risk
8/8/2013
01:45 PM
Connect Directly
RSS
E-Mail
50%
50%

Chrome Security Shocker Creates Password Anxiety

Google responds to criticism of stored password handling; security experts say Chrome security team is missing the forest for the trees.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Should people be able to instantly retrieve -- in plaintext -- all the saved passwords stored by the browser they're using?

That's the information security question of the week after Elliott Kember, a director at software development firm Riot, called out Chrome's insane password security strategy. "Google isn't clear about its password security," he said in a blog post, in which he accused Chrome of not behaving as ordinary users would expect. Specifically, after Chrome gets its hands on a password, the browser will reveal it with a single click.

Kember acknowledged that technically astute types often recommend that people avoid storing their passwords in the browser, and use a third-party password manager instead. Another common argument, he said, is that "the computer is already insecure as soon as you have physical access."

But would the average user -- who may share their computer with family or friends -- expect that anyone with access to their PC might so easily retrieve all stored passwords in a single go? "Go up to somebody non-technical. Ask to borrow their computer. Visit chrome://settings/passwords and click 'show' on a few of the rows. See what they have to say," said Kember. "I bet you it won't be 'That's how password management works.'"

[ Department of Homeland Security urges all website operators to check for vulnerability. Read HTTPS Hackable In 30 Seconds: DHS Alert. ]

Google's Chrome team, however, sees things differently. "I appreciate how this appears to a novice, but we've literally spent years evaluating it and have quite a bit of data to inform our position," posted Justin Schuh, head of Chrome security, to the Hacker News site. "And while you're certainly well intentioned, what you're proposing is that that we make users less safe than they are today by providing them [with] a false sense of security and encouraging dangerous behavior. That's just not how we approach security on Chrome."

Schuh added that passwords stored by any application on a system are "trivially recoverable" by anyone with access to that system, and said adding a master password to the application was "security theater."

Many security experts, however, said that Schuh missed the forest for the trees.

"How to get all your big sister's passwords ... and a disappointing reply from Chrome team," tweeted World Wide Web inventor Tim Berners-Lee.

How do other browsers handle passwords? Apple's Safari includes a "show password" setting, but to be enabled, OS X first requires the user to enter their master keychain password. In fact, Kember's post was sparked by his finding that when importing bookmarks on his Mac from Safari to Chrome, all of the passwords stored by Safari had to be automatically loaded into Chrome, at which point anyone with access to his Mac could reveal them with a single click -- no password required.

Like Chrome, both Firefox and Opera will show passwords, although they do allow users to restrict access to that feature by adding a master password. Still, per Schuh's comment, anyone with the requisite skills can still retrieve the stored passwords. The same applies for passwords stored by Internet Explorer, which can be retrieved via Registry tweaks or by using free third-party tools.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3562
Published: 2014-08-21
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.

CVE-2014-3577
Published: 2014-08-21
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-...

CVE-2014-5158
Published: 2014-08-21
The (1) av-centerd SOAP service and (2) backup command in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary commands via unspecified vectors.

CVE-2014-5159
Published: 2014-08-21
SQL injection vulnerability in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary SQL commands via the ws_data parameter.

CVE-2014-5210
Published: 2014-08-21
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) remote_task or (2) get_license request, a different vulnerability than CVE-2014-3804 and CVE-2014-3805.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.