Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Contrary to what password managers say, a server compromise can mean game over.

Contrary to what password managers say, a server compromise can mean game over.

Scheduled Pinned Locked Moved Uncategorized
24 Posts 18 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • tehstu@hachyderm.ioT tehstu@hachyderm.io

    @dangoodin Interesting article. Always good to know the trade-offs of cloud vaults vs local, etc.

    As a Bitwarden user, are there any mitigating actions one might take? Or is this more of a "know your threat model" sort of thing?

    dangoodin@infosec.exchangeD This user is from outside of this forum
    dangoodin@infosec.exchangeD This user is from outside of this forum
    dangoodin@infosec.exchange
    wrote last edited by
    #7

    @tehstu

    Well, first it's entirely possible that your threat model doesn't really require a nation-state group hacking a Bitwarden server. Beyond that, turn off the key escrow and other features mentioned in the article and you're likely fine.

    tab2space@mastodon.socialT 1 Reply Last reply
    0
    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

      Contrary to what password managers say, a server compromise can mean game over.

      Link Preview Image
      Password managers' promise that they can't see your vaults isn't always true

      Contrary to what password managers say, a server compromise can mean game over.

      favicon

      Ars Technica (arstechnica.com)

      causeofbsod@wetdry.worldC This user is from outside of this forum
      causeofbsod@wetdry.worldC This user is from outside of this forum
      causeofbsod@wetdry.world
      wrote last edited by
      #8

      @dangoodin i mean if the server can deliver code (say, to a web-based version) then its simple to push some code that sends the actual encryption keys back

      1 Reply Last reply
      0
      • xlrobot@mastodon.socialX xlrobot@mastodon.social

        @dangoodin cool cool just remember that contrary to what Ars says, their articles aren't written by people

        gullevek@famichiki.jpG This user is from outside of this forum
        gullevek@famichiki.jpG This user is from outside of this forum
        gullevek@famichiki.jp
        wrote last edited by
        #9

        @xlrobot @dangoodin Hahahaha. Poor ars fucked themselves over hard. Nobody will trust anything thy write anymore

        C 1 Reply Last reply
        0
        • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

          Contrary to what password managers say, a server compromise can mean game over.

          Link Preview Image
          Password managers' promise that they can't see your vaults isn't always true

          Contrary to what password managers say, a server compromise can mean game over.

          favicon

          Ars Technica (arstechnica.com)

          lupus_blackfur@mastodon.worldL This user is from outside of this forum
          lupus_blackfur@mastodon.worldL This user is from outside of this forum
          lupus_blackfur@mastodon.world
          wrote last edited by
          #10

          @dangoodin
          @briankrebs

          FFS...

          Have we not known this since...
          Oh, I don't know...

          Maybe since the cloud FUCKING has existed...???

          🤔🤔🙄🙄

          1 Reply Last reply
          0
          • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

            Contrary to what password managers say, a server compromise can mean game over.

            Link Preview Image
            Password managers' promise that they can't see your vaults isn't always true

            Contrary to what password managers say, a server compromise can mean game over.

            favicon

            Ars Technica (arstechnica.com)

            tartley@fosstodon.orgT This user is from outside of this forum
            tartley@fosstodon.orgT This user is from outside of this forum
            tartley@fosstodon.org
            wrote last edited by
            #11

            @dangoodin One of the reasons why ppl should simply use a non-cloud password manager like Keepassxc. Sync the encrypted file where you need it using something like syncthing. Own your data! And especially such a crucial thing as all your passwords. Why why why would you ever entrust that to someone else?

            angelascholder@mastodon.energyA 1 Reply Last reply
            0
            • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

              Contrary to what password managers say, a server compromise can mean game over.

              Link Preview Image
              Password managers' promise that they can't see your vaults isn't always true

              Contrary to what password managers say, a server compromise can mean game over.

              favicon

              Ars Technica (arstechnica.com)

              iveyline@mastodon.nzI This user is from outside of this forum
              iveyline@mastodon.nzI This user is from outside of this forum
              iveyline@mastodon.nz
              wrote last edited by
              #12

              @dangoodin I keep all my passwords on two separate external drive which are disconnected from my laptop ehen I don't need them

              x41h@infosec.exchangeX 1 Reply Last reply
              0
              • slyborg@vmst.ioS slyborg@vmst.io

                So… “your data is safe even if the server is breached” and also “nothing can prevent data compromise if an attacker controls the server”. Subtle difference, I guess - maybe your vault is uncrackable if the data leaks/is stolen, but the actual worst case threat model is where an attacker has backdoored your infrastructure. (2/3)

                slyborg@vmst.ioS This user is from outside of this forum
                slyborg@vmst.ioS This user is from outside of this forum
                slyborg@vmst.io
                wrote last edited by
                #13

                The only way to win is not to play - and 1Password removed the ability to have local vaults in order to increase shareholder value. I cringe every time I see that page of theirs that proudly claims that “1Password has never been breached” because the headline revealing a massive 1Password breach is simply inevitable. (3/3)

                1 Reply Last reply
                0
                • slyborg@vmst.ioS slyborg@vmst.io

                  @dangoodin https://1passwordstatic.com/files/security/1password-white-paper.pdf

                  "At present there’s no practical method for a user to verify the public key they’re encrypting data to belongs to their intended recipient. As a consequence it would be possible for a malicious or compromised 1Password server to provide dishonest public keys to the user, and run a successful attack. Under such an attack, it would be possible for the 1Password server to acquire vault encryption keys with little ability for users to detect or prevent it.” (1/3)

                  slyborg@vmst.ioS This user is from outside of this forum
                  slyborg@vmst.ioS This user is from outside of this forum
                  slyborg@vmst.io
                  wrote last edited by
                  #14

                  So… “your data is safe even if the server is breached” and also “nothing can prevent data compromise if an attacker controls the server”. Subtle difference, I guess - maybe your vault is uncrackable if the data leaks/is stolen, but the actual worst case threat model is where an attacker has backdoored your infrastructure. (2/3)

                  slyborg@vmst.ioS 1 Reply Last reply
                  0
                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                    Contrary to what password managers say, a server compromise can mean game over.

                    Link Preview Image
                    Password managers' promise that they can't see your vaults isn't always true

                    Contrary to what password managers say, a server compromise can mean game over.

                    favicon

                    Ars Technica (arstechnica.com)

                    slyborg@vmst.ioS This user is from outside of this forum
                    slyborg@vmst.ioS This user is from outside of this forum
                    slyborg@vmst.io
                    wrote last edited by
                    #15

                    @dangoodin https://1passwordstatic.com/files/security/1password-white-paper.pdf

                    "At present there’s no practical method for a user to verify the public key they’re encrypting data to belongs to their intended recipient. As a consequence it would be possible for a malicious or compromised 1Password server to provide dishonest public keys to the user, and run a successful attack. Under such an attack, it would be possible for the 1Password server to acquire vault encryption keys with little ability for users to detect or prevent it.” (1/3)

                    slyborg@vmst.ioS 1 Reply Last reply
                    0
                    • iveyline@mastodon.nzI iveyline@mastodon.nz

                      @dangoodin I keep all my passwords on two separate external drive which are disconnected from my laptop ehen I don't need them

                      x41h@infosec.exchangeX This user is from outside of this forum
                      x41h@infosec.exchangeX This user is from outside of this forum
                      x41h@infosec.exchange
                      wrote last edited by
                      #16

                      @Iveyline @dangoodin only useful if you trust the 3P is actually encrypting your password on their server.

                      1 Reply Last reply
                      0
                      • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                        Contrary to what password managers say, a server compromise can mean game over.

                        Link Preview Image
                        Password managers' promise that they can't see your vaults isn't always true

                        Contrary to what password managers say, a server compromise can mean game over.

                        favicon

                        Ars Technica (arstechnica.com)

                        angelascholder@mastodon.energyA This user is from outside of this forum
                        angelascholder@mastodon.energyA This user is from outside of this forum
                        angelascholder@mastodon.energy
                        wrote last edited by
                        #17

                        @dangoodin Yeah, great!
                        Still happy to be using KeePass with the database on our own NAS with a copy in an online recoverable place for a big disaster where we would lose all our electronic devices.

                        The desktops connect direct to the database file on the NAS. It's synchronised to our netbooks and laptop, and on the mobiles the file is synchronised via WebDAV. So, we have access on all our devices, and it's all under our own control.

                        1 Reply Last reply
                        0
                        • tartley@fosstodon.orgT tartley@fosstodon.org

                          @dangoodin One of the reasons why ppl should simply use a non-cloud password manager like Keepassxc. Sync the encrypted file where you need it using something like syncthing. Own your data! And especially such a crucial thing as all your passwords. Why why why would you ever entrust that to someone else?

                          angelascholder@mastodon.energyA This user is from outside of this forum
                          angelascholder@mastodon.energyA This user is from outside of this forum
                          angelascholder@mastodon.energy
                          wrote last edited by
                          #18

                          @tartley @dangoodin I don't really like KeePassXC, but didn't manage to get KeePass back on my Ubuntu machine.

                          1 Reply Last reply
                          0
                          • gullevek@famichiki.jpG gullevek@famichiki.jp

                            @xlrobot @dangoodin Hahahaha. Poor ars fucked themselves over hard. Nobody will trust anything thy write anymore

                            C This user is from outside of this forum
                            C This user is from outside of this forum
                            cafeinux@infosec.exchange
                            wrote last edited by
                            #19

                            @gullevek
                            Care to elaborate? I suppose Ars published some bad AI slop but I didn't get to witness the drama, so I don't know the details nor the extend of it.
                            @xlrobot @dangoodin

                            gullevek@famichiki.jpG 1 Reply Last reply
                            0
                            • C cafeinux@infosec.exchange

                              @gullevek
                              Care to elaborate? I suppose Ars published some bad AI slop but I didn't get to witness the drama, so I don't know the details nor the extend of it.
                              @xlrobot @dangoodin

                              gullevek@famichiki.jpG This user is from outside of this forum
                              gullevek@famichiki.jpG This user is from outside of this forum
                              gullevek@famichiki.jp
                              wrote last edited by
                              #20

                              @cafeinux @xlrobot @dangoodin https://sfba.social/@jeridansky/116089180436195865

                              Basically Ars published an article where most of the quotes where made up by AI and the article was about the Mathplot guy who “upset” an LLM agent that then wrote a hate post about beeing rejected from a pull request. The whole thing is just surreal. I lost all hope into the future

                              1 Reply Last reply
                              0
                              • rrustema@mastodon.socialR This user is from outside of this forum
                                rrustema@mastodon.socialR This user is from outside of this forum
                                rrustema@mastodon.social
                                wrote last edited by
                                #21

                                @notyourfanboy @dangoodin That version is not supported anymore, is it? I was forced to use their cloud when upgrading from version 7 to 8.

                                1 Reply Last reply
                                0
                                • rrustema@mastodon.socialR This user is from outside of this forum
                                  rrustema@mastodon.socialR This user is from outside of this forum
                                  rrustema@mastodon.social
                                  wrote last edited by
                                  #22

                                  @notyourfanboy @dangoodin I am sorry, I assumed 1Password. Will check out Password Safe!

                                  1 Reply Last reply
                                  0
                                  • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                    @tehstu

                                    Well, first it's entirely possible that your threat model doesn't really require a nation-state group hacking a Bitwarden server. Beyond that, turn off the key escrow and other features mentioned in the article and you're likely fine.

                                    tab2space@mastodon.socialT This user is from outside of this forum
                                    tab2space@mastodon.socialT This user is from outside of this forum
                                    tab2space@mastodon.social
                                    wrote last edited by
                                    #23

                                    @dangoodin @tehstu

                                    Likely fine for now, until the next server-hosted "not really zero knowledge" problem is discovered. Very likely, it already has been discovered... So you're down to hoping the discoverer isn't hunting you and your secrets in particular.

                                    1 Reply Last reply
                                    0
                                    • dangoodin@infosec.exchangeD dangoodin@infosec.exchange

                                      Contrary to what password managers say, a server compromise can mean game over.

                                      Link Preview Image
                                      Password managers' promise that they can't see your vaults isn't always true

                                      Contrary to what password managers say, a server compromise can mean game over.

                                      favicon

                                      Ars Technica (arstechnica.com)

                                      cys@ohai.socialC This user is from outside of this forum
                                      cys@ohai.socialC This user is from outside of this forum
                                      cys@ohai.social
                                      wrote last edited by
                                      #24

                                      @dangoodin @briankrebs How many cybersecurity terms have lost their original strong meaning over time? Two-factor authentication, one time pad, military grade encryption, and now zero knowledge. That’s off the top of my head. There must be other obvious ones I’ve missed.

                                      1 Reply Last reply
                                      0
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • World
                                      • Users
                                      • Groups