Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Potato Salad
Oct 23, 2014

nobody cares


Cup Runneth Over posted:

https://news.ycombinator.com/item?id=29705957

LastPass might be getting hit by a credential stuffing incident with master passwords, reportedly

lol, lmao

it's ok, Travis Ormandy said lastpass is fine and he definitely didn't have some kind of proverbial gun against his noggin

Adbot
ADBOT LOVES YOU

Esran
Apr 28, 2008
log4shell episode 3: Return of the JNDI

https://lists.apache.org/thread/4dok5924ohqzoftm90jxndx1cxhtdzzw

Esran fucked around with this message at 20:31 on Dec 28, 2021

some kinda jackal
Feb 25, 2003

 
 
I’m on vacation and my phone is off so, despite me helping out for the last two weeks and change, good luck whoever’s job it ACTUALLY is to coordinate the response on this stuff at work :cool:

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness

As entertaining as it is for this to go on forever (just kill the class already!), the requirement that "...an attacker with permission to modify the logging configuration file..." means they're assuming access sufficient that an attacker would very likely be capable of doing RCEs through numerous other means already.

Not sayin' don't fix it / upgrade when you can, but this doesn't sound all that particularly frightening, given the context.

crazysim
May 23, 2004
I AM SOOOOO GAY

is it me or like many trilogies, the third is kinda weak?

it's like those classic "if you have ad admin access, you can do a lot of damage!"

Esran
Apr 28, 2008
Yes, thankfully this one sounds like an "upgrade during normal working hours".

Combat Pretzel
Jun 23, 2004

No, seriously... what kurds?!
I'm curious on how the IT department in my company reacted to this. I currently have no idea what's going on, due to extended Christmas vacation, so I can't await getting back in January.

Their kneejerk reaction to the PrintNightmare stuff this summer was to proactively break printing for everyone in the company.

RFC2324
Jun 7, 2012

http 418

Then the correct response is to proactively break *everything*

DrDork
Dec 29, 2003
commanding officer of the Army of Dorkness
To be fair, enterprise printing was a mistake and I fully approve of proactively breaking printing on principle for everyone.

evil_bunnY
Apr 2, 2003


"where an attacker with permission to modify the logging configuration file"

who gives a poo poo

Thanks Ants
May 21, 2004

#essereFerrari


Yeah if that counts then you might as well start listing all the things that can be done with a bootable USB stick or hypervisor access and calling them vulns

RFC2324
Jun 7, 2012

http 418

Thanks Ants posted:

Yeah if that counts then you might as well start listing all the things that can be done with a bootable USB stick or hypervisor access and calling them vulns

they are, they are just <WONTFIX>

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

evil_bunnY posted:

"where an attacker with permission to modify the logging configuration file"

who gives a poo poo

Yeah, at that point they already won.

chin up everything sucks
Jan 29, 2012

evil_bunnY posted:

"where an attacker with permission to modify the logging configuration file"

who gives a poo poo

It's not dangerous at all except when used as part of a supply chain attack.
Hacker finds a commonly used but rarely updated software package. Hacker finds a way to compromise the package so it now includes a pre-hosed version of Log4J and something that pings a C&C on rare occasion. Now the hacker has a self-identifying list of servers open for a RCE until people figure out the root cause.

Volmarias
Dec 31, 2002

EMAIL... THE INTERNET... SEARCH ENGINES...

chin up everything sucks posted:

It's not dangerous at all except when used as part of a supply chain attack.
Hacker finds a commonly used but rarely updated software package. Hacker finds a way to compromise the package so it now includes a pre-hosed version of Log4J and something that pings a C&C on rare occasion. Now the hacker has a self-identifying list of servers open for a RCE until people figure out the root cause.

A version that, apparently, cannot just pop open a shell for itself...?

chin up everything sucks
Jan 29, 2012

Volmarias posted:

A version that, apparently, cannot just pop open a shell for itself...?

Depends on how long they want to maintain access to devices, or if they want to burn them immediately. There is a business in backdooring devices and then selling access to them to other criminals.

spankmeister
Jun 15, 2008






These kinds of vulnerabilities are how hackers might escalate privileges, move laterally, and establish persistence after they've already gained some access inside a network. It should absolutely get patched, but it's fine to roll in into you regular patch schedule because it's not nearly as bad as the first log4j vulnerability.

evil_bunnY
Apr 2, 2003

spankmeister posted:

These kinds of vulnerabilities are how hackers might escalate privileges, move laterally, and establish persistence after they've already gained some access inside a network. It should absolutely get patched, but it's fine to roll in into you regular patch schedule because it's not nearly as bad as the first log4j vulnerability.
Exactly. See you assholes on monday.

Cup Runneth Over
Aug 8, 2009

She said life's
Too short to worry
Life's too long to wait
It's too short
Not to love everybody
Life's too long to hate


Ynglaur posted:

I'm halfway through the thread and it's just nerds arguing with someone to update a blog post from 2017 because apparently if to write a piece of code ever you have an obligation to update your blog posts about it in perpetuity.

Also the OP got their master password compromised and didn't have their original MFA token. I mean, maybe a credential stuffing attack is there, but I don't think that's the only potential cause of the problem and it's a single report on a forum.

On the other hand

https://twitter.com/GossiTheDog/status/1475881608557338634

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Consider me wrong then! Thanks for following up.

Arivia
Mar 17, 2011
why in all dear god would you use your master password for a password manager in multiple places

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Arivia posted:

why in all dear god would you use your master password for a password manager in multiple places

It said that you only have to remember one password so...

Rescue Toaster
Mar 13, 2003

Arivia posted:

why in all dear god would you use your master password for a password manager in multiple places

I mean every single cloud-based password manager service uses your master password as both your vault key and as the login to the website. No possible downsides to that, right?

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Rescue Toaster posted:

I mean every single cloud-based password manager service uses your master password as both your vault key and as the login to the website. No possible downsides to that, right?

Not beyond the concept of one key to the kingdom, or accessing your vault from anywhere other than localhost. The website is really just a GUI, after all.

Arivia
Mar 17, 2011

Rescue Toaster posted:

I mean every single cloud-based password manager service uses your master password as both your vault key and as the login to the website. No possible downsides to that, right?

at least 1password asks for the secret key thing to prove i have something in addition to knowing something on the website, but jeez

Proteus Jones
Feb 28, 2013



Arivia posted:

at least 1password asks for the secret key thing to prove i have something in addition to knowing something on the website, but jeez

It's been a while since I've accessed the cloud client, but I think you can also set it up so that you can use one of the native apps to validate access as well.

e: nope as I think about further, that's for validating native app installs I think. not cloud.

Rescue Toaster
Mar 13, 2003
I guess I'm not even differentiating about native clients vs browser plugins vs javascript 'client'. Doesn't change the fact that to login to the 1password or lastpass or bitwarden website your regular old login is your master password. KeePass is the only thing I can think of that lets you use a server/account completely divorced from your master vault password.

I think 1password takes the cake for dumbest poo poo ever "Your Secret Key was created on your own device. We have no record of your Secret Key and can’t recover it." "Your Secret Key and your 1Password account password both protect your data. They’re combined to create the full encryption key that encrypts everything you store in 1Password." ...and then just to login to the website for any dumb reason please type both your master password and secret key into these text boxes in your browser! No person or browser has ever been tricked with a fake website ever before, so there's no risk of you losing both at the same time, thankfully!

I'm well aware I seem to be the only person on earth that thinks this is stupid I guess.

Rescue Toaster fucked around with this message at 00:53 on Jan 1, 2022

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?
The threat profile you just described is the same for Office 365, Google, and any other service you log into that doesn't run on hardware you control that passes over a network you also don't control.

Would a separate website password be more secure, if it then gave you access to a second page on which you entered your master password? What would a separate website password do?

Rescue Toaster
Mar 13, 2003

Ynglaur posted:

The threat profile you just described is the same for Office 365, Google, and any other service you log into that doesn't run on hardware you control that passes over a network you also don't control.

Would a separate website password be more secure, if it then gave you access to a second page on which you entered your master password? What would a separate website password do?

Given the choice I would never enter my master password in a regular old hosted webpage in a web browser. I would never use a 'web vault', I'd stick to standalone apps and/or a browser plugin if necessary.

I get what you're saying about threat profile. Would you trust google or office 365 enough to put every single password to every single service you use in a google doc, if all the encrypting & decrypting was done right in the browser in javascript on a regular webpage (not even in a special browser plugin, just a hosted page)? Because right now that's basically what you're forced to do with all the big password manager sites, that's the level of trust you place in them. I would trust them to hold onto an encrypted file for me, and that's it. That's what I want out of a cloud password manager service.

Arivia
Mar 17, 2011

Rescue Toaster posted:

Given the choice I would never enter my master password in a regular old hosted webpage in a web browser. I would never use a 'web vault', I'd stick to standalone apps and/or a browser plugin if necessary.

I get what you're saying about threat profile. Would you trust google or office 365 enough to put every single password to every single service you use in a google doc, if all the encrypting & decrypting was done right in the browser in javascript on a regular webpage (not even in a special browser plugin, just a hosted page)? Because right now that's basically what you're forced to do with all the big password manager sites, that's the level of trust you place in them. I would trust them to hold onto an encrypted file for me, and that's it. That's what I want out of a cloud password manager service.

I’m not an infosec professional and I don’t have the energy to roll my own keepass or whatever. I use 1Password (subscription) because yeah it is at least a bit safer overall even if someone just has to pop my master password on any of my devices to get in. There are definitely more secure options but I am very limited by means and ability and tbh I have had it for like six years now and no complaints ever.

And honestly with covid and everything it’s nice that I was able to give my next of kin the master password to get into my poo poo easily if I do croak. Already came close once this year.

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano

Rescue Toaster posted:

Given the choice I would never enter my master password in a regular old hosted webpage in a web browser. I would never use a 'web vault', I'd stick to standalone apps and/or a browser plugin if necessary.

I get what you're saying about threat profile. Would you trust google or office 365 enough to put every single password to every single service you use in a google doc, if all the encrypting & decrypting was done right in the browser in javascript on a regular webpage (not even in a special browser plugin, just a hosted page)? Because right now that's basically what you're forced to do with all the big password manager sites, that's the level of trust you place in them. I would trust them to hold onto an encrypted file for me, and that's it. That's what I want out of a cloud password manager service.

I don't understand why you think you're "forced" to use the web vault feature of 1Password - they have native apps and extensions for basically every OS and browser that work the way you describe (proper e2ee where the server just holds an encrypted blob)

The only thing I'm aware of that necessitates logging into their website is if you need to update your billing details - at which point, sure, they could pwn you with some backdoored JS that siphons off your secret key and master password instead of doing everything in the browser. But your complaint appears to be about something more than this one edge case?

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

Rescue Toaster posted:

Given the choice I would never enter my master password in a regular old hosted webpage in a web browser. I would never use a 'web vault', I'd stick to standalone apps and/or a browser plugin if necessary.

I get what you're saying about threat profile. Would you trust google or office 365 enough to put every single password to every single service you use in a google doc, if all the encrypting & decrypting was done right in the browser in javascript on a regular webpage (not even in a special browser plugin, just a hosted page)? Because right now that's basically what you're forced to do with all the big password manager sites, that's the level of trust you place in them. I would trust them to hold onto an encrypted file for me, and that's it. That's what I want out of a cloud password manager service.

This is a reasonable and consistent position, at least. My personal threat profile is such that I'm fine trusting a limited set of providers with certain info. MFA makes this quite a bit safer than a few years ago.

Also, Happy New Year Infosec goons! May your CVEs be interesting, easily patched, and already remediate by your limited blast radii.

Rescue Toaster
Mar 13, 2003

Rufus Ping posted:

The only thing I'm aware of that necessitates logging into their website is if you need to update your billing details - at which point, sure, they could pwn you with some backdoored JS that siphons off your secret key and master password instead of doing everything in the browser. But your complaint appears to be about something more than this one edge case?

No this is my primary complaint. The login information to the website/cloud service for billing and syncing has nothing to do with the actual vault password. They should not be conflated, period. My brain is screaming at me that this is bad design and it makes it hard to trust or feel comfortable with the rest of the ecosystem. I'll be the first to admit I have a hard time sometimes separating 'this is a practical threat' vs 'this is just unnecessary attack surface'.

A supply side attack is always possible with the clients, that's basically unavoidable. But opening up a weird world of JS or domain fuckery or sketchy SSL cert issuers or other BS going on in a browser and so on just so you don't have a separate login password seems so unnecessary. I agree with Ynglaur that MFA helps a lot as they'd have to combine some theft of the credentials with stealing a client device that has the vault since they shouldn't be able to get both from the service without a MFA token. This assumes they won't just reset/bypass the MFA if you contact support and complain though. 1password for sure has a 'lost mfa' recovery process through support that you cannot opt out of or disable.

Rescue Toaster fucked around with this message at 05:12 on Jan 1, 2022

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Rescue Toaster posted:

Would you trust google or office 365 enough to put every single password to every single service you use in a google doc, if all the encrypting & decrypting was done right in the browser in javascript on a regular webpage (not even in a special browser plugin, just a hosted page)?

tbh, I probably would. breaking gdocs is way more valuable that doing a phish good enough to compromise me, and I don’t think I’m an interesting-enough target to warrant burning a vuln like that.

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano

Rescue Toaster posted:

But opening up a weird world of JS or domain fuckery or sketchy SSL cert issuers or other BS going on in a browser and so on
I think you'd benefit from being more precise here: what exact scenario(s) involving domains and SSL certs are you imagining?

Bearing in mind 1P takes advantage of HSTS preloading, CAA records, DNSSEC, etc, think exactly what an attacker would have to achieve to be successful in your chosen attack. And then consider that, unless you happen to be logging in to update your billing information while this is going on, it doesn't affect you at all.

Rust Martialis
May 8, 2007

At night, Bavovnyatko quietly comes to the occupiers’ bases, depots, airfields, oil refineries and other places full of flammable items and starts playing with fire there
Woke up, saw 9 unread, thought, oh gently caress, 2.18.0

BlankSystemDaemon
Mar 13, 2009



AKA - Always Keep rear end.

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Rufus Ping posted:

I think you'd benefit from being more precise here: what exact scenario(s) involving domains and SSL certs are you imagining?

Bearing in mind 1P takes advantage of HSTS preloading, CAA records, DNSSEC, etc, think exactly what an attacker would have to achieve to be successful in your chosen attack. And then consider that, unless you happen to be logging in to update your billing information while this is going on, it doesn't affect you at all.

Phishing is absolutely a relevant attack. Why do they even need to know your client-generated key in addition to your password in this scenario anyway? What additional security does it provide compared to password alone?

Saukkis
May 16, 2003

Unless I'm on the inside curve pointing straight at oncoming traffic the high beams stay on and I laugh at your puny protest flashes.
I am Most Important Man. Most Important Man in the World.

Arivia posted:

I’m not an infosec professional and I don’t have the energy to roll my own keepass or whatever. I use 1Password (subscription) because yeah it is at least a bit safer overall even if someone just has to pop my master password on any of my devices to get in. There are definitely more secure options but I am very limited by means and ability and tbh I have had it for like six years now and no complaints ever.

And honestly with covid and everything it’s nice that I was able to give my next of kin the master password to get into my poo poo easily if I do croak. Already came close once this year.

But do you really need to roll your own Keepass? Do you have any cloud storage, Google Drive, Dropbox, whatever? You download and install the client, which is pretty much the same you would do with any other manager. Then create a new database, set the master password and any other security settings you want and save the database in your cloud storage folder. The biggest extra complication is deciding which browser plugin to choose, since Keepass doesn't have an official recommended one.

Adbot
ADBOT LOVES YOU

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano

Jabor posted:

Phishing is absolutely a relevant attack.
fortunately the 1password browser extension fills properly on their own website, entirely eliminating phishing as a vector

Jabor posted:

Why do they even need to know your client-generated key in addition to your password in this scenario anyway? What additional security does it provide compared to password alone?
they shouldn't need it for billing access, you're right. They've obviously prioritised simplicity for the end user over protecting against this particular attack scenario. I just don't think this is the gigantic flaw that Rescue Toaster is acting like it is

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply