[Pidgin] #16800: Passwords not protected

Pidgin trac at pidgin.im
Wed Nov 4 05:26:53 EST 2015


#16800: Passwords not protected
---------------------------------+---------------------------
 Reporter:  liar666              |       Owner:  EionRobb
     Type:  defect               |      Status:  new
Milestone:                       |   Component:  unclassified
  Version:  2.10.11              |  Resolution:
 Keywords:  Plaintext Passwords  |
---------------------------------+---------------------------
Description changed by liar666:

Old description:

> Using LaZagne, I discovered that Pidgin stores passwords in plain-text.
>
> Looking for a solution to this '''serious''' problem, I found the page:
> https://developer.pidgin.im/wiki/PlainTextPasswords
>
> There, I read:
> - "Instant messaging is not very secure, and it's kind of pointless to
> spend a lot of time adding protections onto the fairly strong file
> protections of UNIX (our native platform) when the protocols themselves
> aren't all that secure. The way to truly know who you are talking to is
> to use an encryption plugin on both ends (such as OTR or pidgin-
> encryption), and use verified GPG keys. Secondly, you shouldn't be using
> your instant messaging password for anything else."
>
> This argument is totally fallacious: nowadays, most of the IM accounts
> are related to more general accounts, like Google(+)/Yahoo/MSN-Skype/...
> So leaving accounts passwords exposed in plain text exposes '''a lot more
> information''' (personal & professional emails, web search history,
> localization data, applications install on mobile devices, etc.) than
> what the not-protected IM messaging protocols expose (a few stupid short
> messages between acquaintances that are often not even friends IRL)!!!
>
> - "none of these IM applications provide any sort of real password
> security <big list of other IM software>"
>
> This argument it also totally fallacious: this is not because there are
> plenty of others that do bad things, that we must do the same!!!!!
> Otherwise our societies would just be a bunch of people killing other
> people.
>
> - Finally, "Store a password(s) behind a password"
> there is no argument against this. This is what other software do in
> similar situations (Firefox, Thunderbird, etc.) and is what I would like
> to see implemented.

New description:

 Using LaZagne, I discovered that Pidgin stores passwords in plain-text.

 Looking for a solution to this '''serious''' problem, I found the page:
 https://developer.pidgin.im/wiki/PlainTextPasswords

 There, I read:
 - "Instant messaging is not very secure, and it's kind of pointless to
 spend a lot of time adding protections onto the fairly strong file
 protections of UNIX (our native platform) when the protocols themselves
 aren't all that secure. The way to truly know who you are talking to is to
 use an encryption plugin on both ends (such as OTR or pidgin-encryption),
 and use verified GPG keys. Secondly, you shouldn't be using your instant
 messaging password for anything else."

 This argument is totally fallacious: nowadays, most of the IM accounts are
 related to more general accounts, like Google(+)/Yahoo/MSN-Skype/... So
 leaving accounts passwords exposed in plain text exposes '''a lot more
 information''' (personal & professional emails, web search history,
 localization data, applications install on mobile devices, etc.) than what
 the not-protected IM messaging protocols expose (a few stupid short
 messages between acquaintances that are often not even friends IRL)!!!

 - "none of these IM applications provide any sort of real password
 security <big list of other IM software>"

 This argument it also totally fallacious: this is not because there are
 plenty of others that do bad things, that we must do the same!!!!!
 Otherwise our societies would just be a bunch of people killing other
 people.

 - Finally, "Store a password(s) behind a password"
 there is no argument against this. This is what other software do in
 similar situations (Firefox, Thunderbird, etc.) and is what I would like
 to see implemented.

 By the way, I think you would agree with the following page about the
 trojan running a keylogger:
 https://forum.filezilla-project.org/viewtopic.php?t=32286
 But you would be wrong: in computer, there is no 100% security. ''The
 purpose of computer security is not to guarantee your personal data will
 never be accessed'' ('''this is impossible''') ''but to make any intrusion
 as difficult as possible''. Considering this, writing a trojan that runs a
 keylogger requires '''a lot more skills''' than script kidding a forged
 email/macro/pdf-file/whatever-you-want that reads a plain text file (at
 least on Unices)!

--

--
Ticket URL: <https://developer.pidgin.im/ticket/16800#comment:1>
Pidgin <https://pidgin.im>
Pidgin


More information about the Tracker mailing list