Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Dropbox Two-Factor Authentication Has Kinks, Users Say

Cloud storage provider upgrades security after attacker stole data from Dropbox employee's account. But users say the beta version needs tweaks.

Microsoft SkyDrive Vs. Dropbox, Google: Hands-On
Microsoft SkyDrive Vs. Dropbox, Google: Hands-On
(click image for larger view and for slideshow)
Dropbox is making two-factor authentication available to some users as part of a beta test that's meant to shake down the new service.

The feature's debut--for self-selected early adopters--involves installing and running an "experimental build" version of the Dropbox software, released Friday, for their Windows, Mac OS X, or Linux PC. The feature had been previewed by Dropbox's VP of engineering, Aditya Agarwal, last month, after an investigation conducted by Dropbox into a spam campaign against its users was ultimately traced to passwords that had been reused by Dropbox users on other sites, from which the credentials had been stolen.

But Dropbox also found that one password-reuse culprit was in fact a Dropbox employee, who'd stored--unencrypted--a copy of some Dropbox users' email addresses in his Dropbox account, which an attacker then accessed and downloaded. In the wake of that breach, some security experts had recommended that all Dropbox users treat any data they uploaded to the service as publicly accessible.

As of Friday, however, Dropbox users can make it more difficult for attackers to access their stored items, by using the "enable two-step verification" feature now displayed on the security tab of their account pages. The sign-up page states: "Two-step verification adds an extra layer of protection to your account. Whenever you sign in to the Dropbox website or link a new device, you'll need to enter both your password and also a security code sent to your mobile phone." Instead of receiving text messages with a one-time log-in password, however, Dropbox users can choose to use a mobile app.

If going the text-message route, here's how to set it up: Users input their cellphone number into the website, receive a six-digit numeric code, and then provide this back to the Dropbox website. The Dropbox website then gives users a unique 16-digit password, together with this admonition: "If you ever lose your phone, you'll need this emergency backup code to disable two-step verification and access your account."

[ Wondering about security of your text messages? See Android And BlackBerry Safer Than iOS For SMS. ]

While any new security features are to be welcomed, early users have suggested that Dropbox's new two-factor authentication system still isn't ready for primetime. "I'm afraid I don't think we're quite here yet with two-step verification," said Dropbox forum "power user" Grant H. Monday in a post to the company's online forums. "Once a Dropbox user enables two-step verification he should be unable to sign into his account without entering a valid code into the sign-in interface. But that doesn't seem to be the case because mobile apps obviously still work, as does the Dropbox website--without any two-step authentication. The infrastructure shouldn't even allow this to happen."

Multiple users have also criticized the current options for regaining access to an account if a user loses his cellphone or forgets her password. "In Google, I have a mobile authenticator app as my primary method for getting codes. But as a backup, I can have Google call me or text me with a code," said Grant H. "Dropbox only allows a mobile app or SMS, but not both. This is actually so serious that I've left off two-step verification for the time being until it's fixed."

"Pro user" David W. agreed, saying that "to have your entire Dropbox account contingent upon you not losing one 16 character password is crazy!"

Obviously, the two-factor authentication feature is still in beta, and Dropbox will no doubt continue to work out the kinks, but it's not the only security enhancement on offer. Dropbox's Agarwal said last month that Dropbox would also be implementing "new automated mechanisms to help identify suspicious activity" and a page that lists all historical log-ins to a user's account. He also said Dropbox was exploring mandatory password changes, for example if a user's password hadn't been changed for a specified period of time, or if it wasn't sufficiently complex.

Seeing any security improvements from the cloud-storage firm is good news. Of course, with Dropbox now competing in the crowded cloud-storage marketplace, it's arguably a business necessity. Indeed, the service competes directly with Apple iCloud, Box.com, Google Drive, and Microsoft SkyDrive.

Meanwhile, services such as SpiderOak and Wuala are offering a "zero knowledge" approach that encrypts client-side data, but gives the service provider no access to the key, thus helping secure the information not just against outside attackers, but any surreptitious law enforcement access demands

Vulnerability scanners can be used to help detect and fix systemic problems in an organization's security program and monitor the effectiveness of security controls. However, a vulnerability scanner can improve the organization?s security posture only when it is used as part of a vulnerability management program. In our Choosing The Right Vulnerability Scanner report, we give you tips on choosing and implementing vulnerability scanners in your enterprise. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
2/24/2013 | 10:09:13 AM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
Hi ,

I see this is an old message but i still have the same issue.
O do not have the backup code and they refuse to send me a new one to my phone. Even when i created a new account with a different email adress with the same phone number i get no help at all. The support just stops responding .

I like dropbox but because of this i quit using dropbox.
User Rank: Apprentice
10/17/2012 | 9:59:08 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
Hi again,

I just received their response to my request for help. Fasten your seat belts: "Your computer is still linked to Dropbox, and you have logged into the website using two-step verification before, you should be able to launch the Dropbox website from the Dropbox icon in your menu bar or system tray. Click on the Dropbox icon and select "Launch Dropbox Website." If this logs you in then you can disable two-step verification from the security page."

I provided a very thorough response to Dropbox support indicating what had happened and all I get is a response that is of no use for me... 1 week and I'm still in square one! In this response I linked back to this website.
User Rank: Apprentice
10/7/2012 | 11:28:41 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
I guess I've made a huge fool of myself, and now I can't use Dropbox to its full. My dynamic codes are not valid (I seem to have used a wrong seed), and so is my local 16-character password.

Guess what. I contacted user support and they have responded me with "Unfortunately, for security purposes, if you can't enter the two-step code, and you failed to store the emergency backup code, we have no way to help you regain access to your Dropbox account.".

I've been an early adopter of Googles 2 factor authentication and I've never had any problem whatsoever. To my surprise I seem to not only have used a wrong seed but also stored a wrong static password (which by the way I copied directly into my password manager).

Dropbox two factor authentication is worse than Google's and if they don't help me out, I'm gonna be utterly disappointed as I have gained over 12GB bringing people to Dropbox.

Can anybody please spot a way for me to solve this?

Your help would be much appreciated.

User Rank: Apprentice
8/29/2012 | 11:12:55 AM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
Even if it is late it's nice to see that leading companies in their respective verticals are giving users the better balance between security and user experience by implementing 2FA which allows us to telesign into our accounts. I know some will claim this make things more complicated, but the slight inconvenience each time you log in is worth the confidence of knowing your files are secure. I'm hoping that more companies start to offer this awesome functionality. This should be a prerequisite to any system that wants to promote itself as being secure.
User Rank: Ninja
8/28/2012 | 11:27:47 AM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
And how do you use this new feature when you don't have a mobile phone? Dropbox should offer more options for the second layer, which would also add a bit more security. With that any hacker has to try multiple ways for the second step and if users want they should be able to have the account blocked for a day if the second method selected is not the one originally chosen.
User Rank: Moderator
8/27/2012 | 11:59:27 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
I'm surprised that Dropbox still uses passwords. Whether you go with 2, 3, 4 or 5 factor authorisation, you'll still be vulnerable to the well-known methods of hacking the result. Also, methods like eyeball scanning, fingerprints or colonoscopy tend to be a bit user-hostile.
Two U.S banks and one in Hong Kong are implementing an authorisation method which is proof against spy cameras, network snoopers, keyloggers, and doesn't need passwords, just a user ID.
There's a nice PowerPoint thingy which describes it reasonably well at www.designsim.com.au/What_is_S....
Number 6
Number 6,
User Rank: Apprentice
8/27/2012 | 5:35:12 PM
re: Dropbox Two-Factor Authentication Has Kinks, Users Say
I'll store that 16-digit key in my Dropbox folder so I can access it anywhere from my smartph... Oh.
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-23
A cross site scripting (XSS) vulnerability in Catfish CMS 4.9.90 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "announcement_gonggao" parameter.
PUBLISHED: 2021-06-23
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.
PUBLISHED: 2021-06-23
Cross Site Scriptiong (XSS) vulnerability in GetSimpleCMS <=3.3.15 via the timezone parameter to settings.php.
PUBLISHED: 2021-06-23
Cross Site Scripting vulnerability in GetSimpleCMS <=3.3.15 via the (1) sitename, (2) username, and (3) email parameters to /admin/setup.php
PUBLISHED: 2021-06-23
Report portal is an open source reporting and analysis framework. Starting from version 3.1.0 of the service-api XML parsing was introduced. Unfortunately the XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML ...