|
Page 2 of 4 |
|
Prev |
1 2
3 4
|
Next
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
i have the PR1.1 fw installed and i had plain password in that file too
but i removed all the IM services and added them again and took a backup and the password does not show up anymore in that file... hmm |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
there's too many stupid excuses coming up in this thread, if it was apple iphone it would already be on the lunch time news about it.
there is no other device in my possession what allows the exploit of passwords via a simple type of few words in a web browser and saying dont let it out your hands is not a solution. How is easy would it be for family and friends to spy on each other and yes it does happens amongst insecure people.. lastly how easy would it be for someone to code something to feed that data to a server? |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Storing passwords in plaintext EVER =
http://skepticalteacher.files.wordpr...8/facepalm.jpg Seriously, it's about 3 more lines of code to encrypt it! |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
On the other hand somebody might now be thinking their passwords are safe. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
but why leave the door open to even make it easy for non tech minded people
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
you know, if you go to "file:///home/user/.ssh/id_rsa", you can see the PRIVATE key file of the N900's user! omg! :)
seriously, i bet the iPhone and android do the same basically, the exact location might be a bit more obscure, but it certainly isn't "encrypted" there, either. saving as a hashed string might be enough to soothe concerns here, and should be fairly easy to implement. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
You are aware that the private key is usually encrypted as well ;)
And it can be any other name :) Hell it could be anywhere else at that :) A salted md5 hash would probably more or less avoid many of the concerns. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
As has been pointed out, with PR1.1 these passwords do not appear to be being saved to the accounts file (for new accounts), so this may already have been "solved". |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
I should be working, but I simply can't let that pass... :) Firstly, I don't care about iPhones. Secondly, there are several devices potentially in your possesion where I could retrieve your stored passwords if I physically had that device in my hands or on a desk in front of me. Your Windows machine? Boot it up with any Linux distro on a USB stick, run the right program and I have all your local user logins and passwords. You're a firefox user? Try running one of your stored passwords through this: Code:
#!/usr/bin/perl -wPresumably if you lost you car keys and your car got stolen as a result, you'd be blaming the manufacturer for that, too? |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
The only solution here is to have a keyring setuped correctly, but if it uses a 5 chars numerical-only key, there is not much gained either.
Not news, move along, nothing to see... |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
as I mentioned before, having a keyring type solution would definately be more secure for this. i.e. encrypting the password file and opening it for logging in with a password. but then you'd have to type in the password every time you want to log in to anything. that done right would protect the passwords to a certain degree.
I guess hashing the password is a simple way to make people feel secure, and it does give some protection against opportunist laymen. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
on the n900 zero effort as to be put in to get them. my mom could do it by reading this thread and needing no software at all lol |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
To provide real security you would have to ask the user for a passphrase to decrypt the password file... either every time the password needs to be used (highly impractical) or the first time, and then cache it for a certain amount of time or until reboot. This is what ssh-agent does for ssh key decryption passphrases. A general solution offering a compromise between security and practicality would be to store this type of information in plain text, but inside an encrypted partition that is mounted at startup (after the user provides a passphrase). This is what I do on my Ubuntu pc, using ecryptfs. Not sure how easy it would be to port something like this to maemo. My guess: not so easy ;-) Paolo |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
Unless you implement strong encryption and a master password that you will always need to enter when some of the services need to read a password from that file. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
So I see a lot of comments here leading to one fact that: as long as you have physical access to the device you shouldn't worry
But, remotely steal your data is a possibility without the need to have access to the device. For example: ATM it's difficult to know thats apps on Extras got anything harmful in them...I believe it is reasonably easy to slip in a code to send accounts.cfg with passwords in plain text back :) Encrypted is better than nothing, if can't encrypted can't be done then don't store them at all. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
So, a guy that knows how to write an app, or inject his malicious code into some other app, and convince you to download and install it, will have more trouble getting your obfuscated passwords than those written in plain text? Come on...
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
I can't believe the sheer arrogance of the ideologic "security folks", preaching supersecurity or none at all.
In practice, having weak security IS better than no security. In this case, at least having encoded passwords is still better than having plaintext. Becaus it at least prevents random/accidental password exposure. Otherwise we could pretty much also stop **** the password entry fields. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
If having access to the device is the only way to get the passwords, then might as well unhide the asterisks so we (the real owners) know what we mistyped. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
It's pretty obvious that the correct solution here is an encrypted store for the passwords on the filesystem, and an keyring process that keeps the unencrypted ones only in memory and hands them out to authorised applications. In other words, the exact same solution as everyone else already uses for this on other platforms (e.g. Gnome keyring, KDE's Wallet, Firefox's password/certificate store).
What seems to be lacking is any will to actually implement that. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Asterisks on password entry (or even unixesque blind password entry) exists purely because someone might be looking over your shoulder - on my home PC I'd pretty much like an option to remove them... On a mobile device those are useful because you cannot control your environment and you never know who is looking over your shoulder.
Password storage is a whole different thing - it exists because of convenience (not having to type passwords whenever you want to connect to some service). If you want to implement some security measures there - you have to give up on the convenience, as simple as that. |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
a) Thinking your passwords are safe while in reality they are not b) Knowing your passwords are not safe (if your device is in wrong hands) Yes there is always the "passwords are safe from your mom and little brother but not someone who knows what he's doing" option, but it will lead many users to "a". |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Bug has been marked as INVALID :(
Oh well, a major fail for N900/Maemo |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
I'm sure if many people knew was told option B before they hit submit to purchase they would not of got the device at all |
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
The `mom` argument is even more ludicrous (specially for grownups that don't live in their moms basement :P) - your mom wouldn't know where to look for the said file. If she would, chances are that she knows how to base64/whatever-fully-reversible-algorithm-is-used decode it. And yes, she might find a site on the internet that shows where the said file is, but then again, if it were obfuscated there would be instructions how to deobfuscate it.
|
Re: Warning - Exploit found, keep N900 to yourself until it's fixed!
Quote:
|
| All times are GMT. The time now is 21:37. |
Page 2 of 4 |
|
Prev |
1 2
3 4
|
Next
vBulletin® Version 3.8.8