Risk
8/8/2013
01:45 PM
50%
50%

Chrome Security Shocker Creates Password Anxiety

Google responds to criticism of stored password handling; security experts say Chrome security team is missing the forest for the trees.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Should people be able to instantly retrieve -- in plaintext -- all the saved passwords stored by the browser they're using?

That's the information security question of the week after Elliott Kember, a director at software development firm Riot, called out Chrome's insane password security strategy. "Google isn't clear about its password security," he said in a blog post, in which he accused Chrome of not behaving as ordinary users would expect. Specifically, after Chrome gets its hands on a password, the browser will reveal it with a single click.

Kember acknowledged that technically astute types often recommend that people avoid storing their passwords in the browser, and use a third-party password manager instead. Another common argument, he said, is that "the computer is already insecure as soon as you have physical access."

But would the average user -- who may share their computer with family or friends -- expect that anyone with access to their PC might so easily retrieve all stored passwords in a single go? "Go up to somebody non-technical. Ask to borrow their computer. Visit chrome://settings/passwords and click 'show' on a few of the rows. See what they have to say," said Kember. "I bet you it won't be 'That's how password management works.'"

[ Department of Homeland Security urges all website operators to check for vulnerability. Read HTTPS Hackable In 30 Seconds: DHS Alert. ]

Google's Chrome team, however, sees things differently. "I appreciate how this appears to a novice, but we've literally spent years evaluating it and have quite a bit of data to inform our position," posted Justin Schuh, head of Chrome security, to the Hacker News site. "And while you're certainly well intentioned, what you're proposing is that that we make users less safe than they are today by providing them [with] a false sense of security and encouraging dangerous behavior. That's just not how we approach security on Chrome."

Schuh added that passwords stored by any application on a system are "trivially recoverable" by anyone with access to that system, and said adding a master password to the application was "security theater."

Many security experts, however, said that Schuh missed the forest for the trees.

"How to get all your big sister's passwords ... and a disappointing reply from Chrome team," tweeted World Wide Web inventor Tim Berners-Lee.

How do other browsers handle passwords? Apple's Safari includes a "show password" setting, but to be enabled, OS X first requires the user to enter their master keychain password. In fact, Kember's post was sparked by his finding that when importing bookmarks on his Mac from Safari to Chrome, all of the passwords stored by Safari had to be automatically loaded into Chrome, at which point anyone with access to his Mac could reveal them with a single click -- no password required.

Like Chrome, both Firefox and Opera will show passwords, although they do allow users to restrict access to that feature by adding a master password. Still, per Schuh's comment, anyone with the requisite skills can still retrieve the stored passwords. The same applies for passwords stored by Internet Explorer, which can be retrieved via Registry tweaks or by using free third-party tools.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.