Password encryption

David Balazic David.Balazic at hermes-softlab.com
Mon Mar 17 12:31:28 EDT 2008


OK, I thought a bit and come up with a much simpler way:
 - remove passwords from accounts.xml
 - store them in a file named DO_NOT_OPEN ;-)

(the problem of matching passwords from one file to accounts
in another is left as an excercise to the reader)

Regards,
David


> -----Original Message-----
> From: support-bounces at pidgin.im 
> [mailto:support-bounces at pidgin.im] On Behalf Of Luke Schierer
> Sent: Monday, March 17, 2008 5:27 PM
> To: support at pidgin.im
> Subject: Re: Password encryption
> 
> David Balazic wrote:
> > Hi!
> > 
> > No, there is a misunderstanding. I talked about 2 (more or
> > less separate) things:
> > 
> >  - protecting the stored passwords
> > 
> > The simplest way for this is enabling the Encryption in Windows
> > on the .purple directory. This is as good as it gets. The only
> > more secure way is not to store the passwords on the PC.
> > 
> 
> If done right, yes, disk (or folder) encryption is secure and 
> works. I 
> have not (until now) addressed that portion of your remarks.
> 
> >  - preventing passwords appearing text editors
> > 
> > This is the secret key stuff I wrote about. Because the key is
> > in a separate file, the data from an editor having the
> > accounts.xml open is useless to an attacker (that is attackers
> > having a view on the users monitor).
> > The purpose of this would be not to protect the stored password data
> > from (all) attacks, but to prevent them being showed on the 
> computers
> > display in plain text/sight. Nothing more.
> > 
> > Regards,
> > David
> > 
> > PS: I not saying this should be implemented in next or any version
> > of pidgin. Just that it would prevent one of the few left over
> > attack vectors in case config direcotry encyption is used.
> > 
> 
> Right, but while this would close off one really rather minor attack 
> vector, it would increase the user's vulnerability to all other (more 
> real) attack vectors, because the user would be lulled into a false 
> feeling of security.
> 
> While some portion of users would avoid that false feeling of 
> security, 
> experience working with the pidgin user base leads me to believe that 
> these users are precisely the ones most likely to know that purple 
> clients store plain text passwords today, and to have already come up 
> with what they consider a reasonable compromise between security and 
> ease of use to cover the situation.
> 
> Thus the security of the user not already handling the 
> situation has a 
> net reduction.  For that reason, we have rejected obscuring 
> the password 
> in favor of waiting and leaving the status quo until something truly 
> secure against a higher percentage of attacks emerges.
> 
> Again, I'm not arguing that disk encryption is or is not a reasonable 
> way to handle sensitive data.  I'm addressing only the generated key 
> portion of your remarks.
> 
> The reality is that if we obscured the password as you suggest, the 
> corporate user who started this thread would think purple 
> clients secure 
> for the environment he envisions using pidgin in, when it is 
> in fact not.
> 
> luke
> 
> 




More information about the Support mailing list