Risk
8/8/2013
01:45 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Chrome Security Shocker Creates Password Anxiety

Google responds to criticism of stored password handling; security experts say Chrome security team is missing the forest for the trees.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Should people be able to instantly retrieve -- in plaintext -- all the saved passwords stored by the browser they're using?

That's the information security question of the week after Elliott Kember, a director at software development firm Riot, called out Chrome's insane password security strategy. "Google isn't clear about its password security," he said in a blog post, in which he accused Chrome of not behaving as ordinary users would expect. Specifically, after Chrome gets its hands on a password, the browser will reveal it with a single click.

Kember acknowledged that technically astute types often recommend that people avoid storing their passwords in the browser, and use a third-party password manager instead. Another common argument, he said, is that "the computer is already insecure as soon as you have physical access."

But would the average user -- who may share their computer with family or friends -- expect that anyone with access to their PC might so easily retrieve all stored passwords in a single go? "Go up to somebody non-technical. Ask to borrow their computer. Visit chrome://settings/passwords and click 'show' on a few of the rows. See what they have to say," said Kember. "I bet you it won't be 'That's how password management works.'"

[ Department of Homeland Security urges all website operators to check for vulnerability. Read HTTPS Hackable In 30 Seconds: DHS Alert. ]

Google's Chrome team, however, sees things differently. "I appreciate how this appears to a novice, but we've literally spent years evaluating it and have quite a bit of data to inform our position," posted Justin Schuh, head of Chrome security, to the Hacker News site. "And while you're certainly well intentioned, what you're proposing is that that we make users less safe than they are today by providing them [with] a false sense of security and encouraging dangerous behavior. That's just not how we approach security on Chrome."

Schuh added that passwords stored by any application on a system are "trivially recoverable" by anyone with access to that system, and said adding a master password to the application was "security theater."

Many security experts, however, said that Schuh missed the forest for the trees.

"How to get all your big sister's passwords ... and a disappointing reply from Chrome team," tweeted World Wide Web inventor Tim Berners-Lee.

How do other browsers handle passwords? Apple's Safari includes a "show password" setting, but to be enabled, OS X first requires the user to enter their master keychain password. In fact, Kember's post was sparked by his finding that when importing bookmarks on his Mac from Safari to Chrome, all of the passwords stored by Safari had to be automatically loaded into Chrome, at which point anyone with access to his Mac could reveal them with a single click -- no password required.

Like Chrome, both Firefox and Opera will show passwords, although they do allow users to restrict access to that feature by adding a master password. Still, per Schuh's comment, anyone with the requisite skills can still retrieve the stored passwords. The same applies for passwords stored by Internet Explorer, which can be retrieved via Registry tweaks or by using free third-party tools.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web