The best and most secure password manager

  • Thread starter Thread starter EngWiPy
  • Start date Start date
AI Thread Summary
Using a password manager can enhance security by allowing users to create and store strong, unique passwords without needing to remember them. Popular options include LastPass and 1Password, both of which offer features like auto-generation of passwords and secure storage across devices. While some users express concerns about the security of cloud storage, encrypted password managers are generally considered safer than browser storage, which can be vulnerable. Writing down passwords on paper is another method some prefer, though it carries its own risks. Ultimately, choosing a password manager involves balancing convenience with security needs.
  • #101
Regarding Lastpass, it looks like malicious actors got access to a database contaning uncrypted info (company names, end user names, billing addresses, telephone numbers, email addresses, IP addresses which customers used to access LastPass,website URLs from password vault), as well as the entire encrypted vault of people, meaning that if they could crack the master password, they would gain access to the personal info of people. And this is what happened to several people, some of them actually stored their Bitcoin's information (as a general rule, one should never, ever, put this info on a computer connected to the Internet...).
There's a dude who lost several Bitcoin suing Lastpass for this.
https://news.bitcoin.com/lastpass-d...y-hack-may-be-worse-than-they-are-letting-on/

https://grahamcluley.com/lostpass-after-the-lastpass-hack-heres-what-you-need-to-know/
 
  • Wow
Likes harborsparrow and Wrichik Basu
Computer science news on Phys.org
  • #102
I think it's worth backing up a step and asking what problem a password manager is trying to solve. I see two:
  1. Using the same password in many places (like having your car keys open your house)
  2. Lousy passwords like 'qwerty'.
They are not trying to:
  1. Keep yout computers safe from attacks by major world governments
  2. Keep your credit card and similar information secure once the vendor has it.
Would it be nice lf these happened too? Sure. But it's not reasonable to expect a PWM to do these things, and it sure does not make any sense not to use one because it is only 99.9999% effective.

It is absolutely true that a bad actor can steal your laptop, remove the hard disk, find the erased swap file, potentially remove it, and knowing something about the PWMs data structures, recover one or more of the individual passwords. It is also true that some PWMs make this easier than others. So what? If they can do this, they can also get into your Quicken data and collection of cat videos. That's hardly the PWM's problem.

Can the PWM company lose their customer data. Sure. Every company can, many have, and those that haven't just haven't yet. Many, likely most of these, have had an "inside man", so it's only a matter of time. That's certainly a problem, but it's not the PWM's problem. Maybe it's PWM Corps's problem, but so long as they don't keep your master password (I don't believe any of the major PWMs do) it's not a PWM problem.

So use a PWM so you can use OOgs1h6&LgXkDlrC5zzUxiZ instead of qwerty. Don't sweat the details.

Can the CIA still break into your laptop. Probably. But don't sweat it; you aren't that important.
 
  • Like
Likes pbuk and anorlunda
  • #103
Vanadium 50 said:
They are not trying to:
  1. Keep yout computers safe from attacks by major world governments
  2. Keep your credit card and similar information secure once the vendor has it.
Many online shopping carts don't actually store your credit card details to help them defeat hackers - the average website is not as secure as your bank's system. They transfer you to a much more secure credit card processing company which complies with all the local laws on security and that's where you enter the card details. These are companies that work world wide with the big credit card suppliers and are trusted because their security gets checked regularly, and they can afford to invest money in keeping it secure.
I know this because I had to find out how a cart that didn't store your card details was having its customers' card details stolen. Just THREE lines of extra code were added by a hacker! And they were three very simple lines of code. It took me seconds to realise what it did, although it took ages to find. The shop in question now pays to use one of these card processing specialists and the company that they use to keep themselves secure.

But I do agree with the rest of Vanadium 50's comments in that post.

PS I think you might be more at risk of a vendor storing your card details if they are a BIG company, as they tend to think their systems are better than those of a small shop making only 10 to 50 online sales a week.

PPS A friend worked on creating one of the first online banking systems. When it was finished, they were challenged to move a real £1,000,000 from one account to another, both accounts being set up and checked by the directors. Embarassingly, they succeeded! (They were surrounded by security guards from several different companies to avoid collusion with a dishonest individual). This delayed the launch of the system by a couple of months...
 
  • Like
Likes Wrichik Basu
  • #104
Vanadium 50 said:
I think it's worth backing up a step and asking what problem a password manager is trying to solve.
I mostly agree with this, however when LastPass refers to something as my "vault" I did expect that it would be encrypted. The fact that the web sites I use, my email addresses as well as other personal information in notes was stored in plain text and may now be easily available to bad actors is unforgivable.

It is IMHO unfortunate that the appallingly bad technical decisions taken by LastPass were not better publicised: I believe that a significant factor in this is the "Chicken Licken" reaction of the press (and posters on this website who should know better) to the concept of a password manager distracting attention from weaknesses in LastPass's specific implementation.
 
Last edited:
  • Like
Likes harborsparrow, vela and Wrichik Basu
  • #105
DrJohn said:
PS I think you might be more at risk of a vendor storing your card details if they are a BIG company, as they tend to think their systems are better than those of a small shop making only 10 to 50 online sales a week.
You certainly are, although it's not about how good they think they are, its about compliance with the PCI standards.

In practice for most online merchants in first world countries the cost of payment gateways such as Stripe is now less than the cost of a merchant account so there is no benefit to be gained by setting up a PCI compliant system so that you can process payments yourself.
 
  • #106
fluidistic said:
the entire encrypted vault of people, meaning that if they could crack the master password, they would gain access to the personal info of people.
According to Gosney, much of the vault was unencrypted, so there is no need to crack the master password to access a lot of the information. This revelation is the one I found most surprising. Like others, I assumed the entire vault would be encrypted since that would have been the obvious design choice when storing a vault in the cloud.

Vanadium 50 said:
Can the PWM company lose their customer data. Sure. Every company can, many have, and those that haven't just haven't yet. Many, likely most of these, have had an "inside man", so it's only a matter of time. That's certainly a problem, but it's not the PWM's problem. Maybe it's PWM Corps's problem, but so long as they don't keep your master password (I don't believe any of the major PWMs do) it's not a PWM problem.
The assumption should be that a breach will happen allowing crackers to get a copy of the vault, and the goal should be to design the software so it is still prohibitively difficult for the crackers to access any information inside the vault. LastPass, the password manager, clearly doesn't meet this criterion. That's a problem with the LastPass software.
 
  • #107
vela said:
According to Gosney, much of the vault was unencrypted, so there is no need to crack the master password to access a lot of the information. This revelation is the one I found most surprising. Like others, I assumed the entire vault would be encrypted since that would have been the obvious design choice when storing a vault in the cloud.
This. And they are making it worse by not being transparent about what is and what is not encrypted in the so-called "vault", still only saying "stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data".

Fortunately there is better information available from an unconnected party: https://github.com/cfbao/lastpass-vault-parser/wiki/LastPass-Vault-Format

So it seems that the exposure may be less serious than it sounds, however the lack of transparency is completely unacceptable.
 
  • #108
One problem with the situation as it stands today is that it has evolved over time. Each release builds on the old, and decisions that may have been sensible once upon a time are not so good now. I'd feel a lot better for any password manager if annually there was a complete code refresh, breaking backward compatibility, along with a single button "change every password on every site". Without that, it's just going to be whack-a-mole.

I think the "vault is unencrypted" story is not really coming at it from the right direction. This isn't a security issue, it's a privacy issue. As I understand it, my credentials for porn-u-copia (I just made that up, but I like the name) are secure, but the fact that I have an account there at all is not. But that ship has sailed - I am sure this is in Google's file on each of us.

However, none of this is a reason to think that using "qwerty" everywhere is a better alternative.
 
  • #109
As an IT pro I use KeyPass, it's a downloadable program which creates a password vault as a local file which is encrypted with a master password. It's an offline program, no synchronising with the web, all your data stays local to that file which you can backup and copy to another computer just like any other file.
 
  • Informative
Likes symbolipoint
  • #110
MikeeMiracle said:
It's an offline program
That would be an issue for many people. I, for instance, would like my passwords accessible from any device and from anywhere. Updating at one place should show the updated version everywhere without me taking the hassle to copy again.
 
  • #111
I'm not sure a purely local solution is ideal. I need passwords on my Windows systems, my Linux systems and in some cases my phone. Having strong passwords for some accounts and 'qwerty' for the rest is not a good idea.

I think of computer security as a resistor network. Increasing it always helps, but once most of the current is diverted to another branch, increasing it further helps only a little. I also view it like a steering wheel immobilizer on your car - if it convinces the bad actor to overlook me and bother someone else, it's done its job.
 
  • #112
Vanadium 50 said:
I'm not sure a purely local solution is ideal. I need passwords on my Windows systems, my Linux systems and in some cases my phone. Having strong passwords for some accounts and 'qwerty' for the rest is not a good idea.

I think of computer security as a resistor network. Increasing it always helps, but once most of the current is diverted to another branch, increasing it further helps only a little. I also view it like a steering wheel immobilizer on your car - if it convinces the bad actor to overlook me and bother someone else, it's done its job.
Then you could place the encrypted vault in dropbox or google drive, or something similar. This way, you recreate a LastPass-like password manager, except that it is more secure (lmao), and even if bad actors get their hands on your vault, you know they won't get any information from it.
 
  • #113
fluidistic said:
Then you could place the encrypted vault in dropbox
This opens up another line of attack - steal the encrypted file and then attempt to decrypt it at your leisure.

Additionally, while I have privacy concerns about how LastPass does things. If I ret a brute force decryption and get gobledygook, I don't know if this is password gobledygoo or non-password gobledygoo. (I can try it, but that takes times and alerts people that an attack is in progress). But if I try a password and it gives me Quicken, Amazon, Chase and Porn-U-Copia (nobody else likes this name? Really?) I am pretty sure I have unlocked the vault.

So whil;e I don't like the design choice they made, its unfair to say there is no reason to do it this wau.
 
  • #114
Vanadium 50 said:
This opens up another line of attack - steal the encrypted file and then attempt to decrypt it at your leisure.
Then I missed your point. How do you do a synchronization between your Linux and Windows password vaults, if it isn't local? Do you have something in mind like a self hosted Bitwarden software, or something else?
I still think using google drive or dropbox is safer than LastPass, even though, as you say, you better have a strong master password because you can assume a malicious actor will get his hands on your encrypted vault.
Vanadium 50 said:
Additionally, while I have privacy concerns about how LastPass does things. If I ret a brute force decryption and get gobledygook, I don't know if this is password gobledygoo or non-password gobledygoo. (I can try it, but that takes times and alerts people that an attack is in progress). But if I try a password and it gives me Quicken, Amazon, Chase and Porn-U-Copia (nobody else likes this name? Really?) I am pretty sure I have unlocked the vault.

So whil;e I don't like the design choice they made, its unfair to say there is no reason to do it this wau.
 
  • #115
Vanadium 50 said:
I think the "vault is unencrypted" story is not really coming at it from the right direction. This isn't a security issue, it's a privacy issue.
It's not an either-or. It's both a security issue and a privacy issue.
 
  • Like
Likes Wrichik Basu
  • #116
I haven't used Enpass, but I'm hearing positive things about it. You can use it locally or share your vault between devices using the cloud storage of your choice.

https://www.enpass.io/
 
  • #117
Wrichik Basu said:
That would be an issue for many people. I, for instance, would like my passwords accessible from any device and from anywhere. Updating at one place should show the updated version everywhere without me taking the hassle to copy again.

That come's down to how security conscious you are and how much you can trust online sources. I had a similar debate about password manager previously on this forum and introduced the concept of zero knowledge policies and was assured that LastPass employed this policy and that a local solution was not required. It would seem whoever made that assertion was incorrect. I am not blaming them for being wrong, they fell for the marketing of LastPass which turned out to be incorrect and why I avoid any "big names" when it comes to storing things online.
 
  • #118
MikeeMiracle said:
That come's down to how security conscious you are and how much you can trust online sources.
An alternative is to use open-source password managers like Bitwarden. LastPass is closed-source, so no one can confidently know what it is doing, but for open-source software, there is the advantage that security researchers are able to audit the code and find deficiencies.
 
  • #119
MikeeMiracle said:
That come's down to how security conscious you are and how much you can trust online sources.
My impression of many "experts" is that they tend to overestimate the risk of sharing a vault over the cloud. So they'll tell you in one breath how to generate a strong password that will take billions of years of computing power on average to crack, and in another breath, imply that if a cracker gets that encrypted info, they'll break it in a matter of minutes.

Obviously, the right choice depends on your particular situation. If I had to protect the secret formula for Coca Cola, I wouldn't want to risk having it accessible online, but if I'm just trying to keep @Vanadium 50's credentials to porn-u-copia secret, having a vault online is a minuscule risk I'm willing to take for the great increase in convenience overall.

MikeeMiracle said:
I had a similar debate about password manager previously on this forum and introduced the concept of zero knowledge policies and was assured that LastPass employed this policy and that a local solution was not required. It would seem whoever made that assertion was incorrect. I am not blaming them for being wrong, they fell for the marketing of LastPass which turned out to be incorrect and why I avoid any "big names" when it comes to storing things online.
LastPass did employ this policy for the encrypted information, what they call "sensitive data." The marketing wasn't incorrect in that sense, but it was misleading as most users reasonably assumed that meant all of their data was encrypted.
 
  • #120
Wrichik Basu said:
An alternative is to use open-source password managers like Bitwarden. LastPass is closed-source, so no one can confidently know what it is doing, but for open-source software, there is the advantage that security researchers are able to audit the code and find deficiencies.
I don't see it as a real advantage because practically speaking, no one ever comprehensively audits the project's code voluntarily because it's a lot of work and requires expertise. Companies and projects can, however, hire security experts to audit their code.
 
  • #121
I have used the same password manager for over 20 years.

I have a word doc with my passwords and abbreviated names of the sites. So for starters, many people wouldn't even know the site the password applies to. For example, if I know BBB is Bed, Bath and Beyond, it is obvious to me but likely not to most hackers.

But the key is the password itself. I have an encryption process I have always used and it only exists in my head. I modify the existing password as I enter it. An example would be to take your saved password, ignore the 2nd, 4th, and 6th characters, and increment the first character by 2. So I can hand you my saved passwords and they would do you no good.
 
  • Like
Likes harborsparrow
  • #122
Am I correct saying that for accounts that make use of multifactor authorization, a compromised password still does not give bad guys account?

I have switched PW managers, now I'm trying to decide if it is necessary to change the passwords on my most critical accounts; all of which have multifactor authorization.

Even more bothersome would be to get new credit card numbers assuming that the old ones might be compromised. The news discusses the fact that login data was encrypted and URLs not encrypted. They don't mention CC numbers/expiration/security code info stored in Lastpass under the "Payment Card" feature.
 
  • #123
anorlunda said:
Am I correct saying that for accounts that make use of multifactor authorization, a compromised password still does not give bad guys account?

Even with single factor, these compromises do not unlock your account. The central password manager database does not (at least for the good PWMs) know your master password.

Since they don't have it,. they can't lose it.
 
  • #124
Vanadium 50 said:
Even with single factor, these compromises do not unlock your account. The central password manager database does not (at least for the good PWMs) know your master password.

Since they don't have it,. they can't lose it.
Sorry, I should have repeated what was said earlier in this thread. The unencrypted URL info identifies the juicy targets for bad guys to try to crack your PW with conventional cracking methods. Cracking one, is 100x times faster than cracking 100.

Of course, if the bad guys see how poor I am, they won't target me anyhow. Millionaires and billionaires should be more worried. That is one of the very rare cases where leaks of my private information may benefit me. Poor people make bad targets.
 
  • #125
I came across a detailed article "decoding" the breach statement issued by LastPass on December 22 last year, written by a security analyst: https://palant.info/2022/12/26/whats-in-a-pr-statement-lastpass-breach-explained/

As mentioned earlier in the thread, the vault of the users was breached, but the master password wasn't, since it's not stored. But, the hashed form of the password is stored. LastPass uses the PBKDF2 algorithm to store the hash of the master password. The number of iterations used in this algorithm for most accounts is 100k. This is far lower than the OWASP recommendation of 310k iterations at that time, but would still make getting the password by brute force difficult. Here's the caveat: LastPass originally used only 5k iterations, and later upgraded to 100k. But some accounts are still sitting with 5k iterations. Reportedly, a few accounts are configured with just 1 (one) iteration. These accounts are quite vulnerable, as their master passwords can be decoded from the hash by brute force without too much effort.

The metadata lost in unencrypted form contained the following:
company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service
Therefore, this is not only a privacy issue (as pointed out by many in this thread), but also makes the users a subject to pishing attacks. In addition, LastPass also stored the IP of the users (all devices from where the user was logged in) in plain text form. Thus, the attacker can now have better knowledge about the whereabouts of the users.

Most probably, LastPass has an option to change the number of iterations manually. The current OWASP recommendation is ≥ 600k, so if anyone here is (still) using LastPass, please make sure to increase the iterations in your vault.



I recently paid for a subscription for Bitwarden. I used the free version for some time, and thought it was decent. I had a free LastPass account for some time, and deleted my data from there after buying Bitwarden.

And then this surfaced: https://palant.info/2023/01/23/bitwarden-design-flaw-server-side-iterations/

In short, Bitwarden uses 200,001 iterations; 100,001 client-side and 100k server-side. But the server-side iterations actually are useless. Many users were enraged, and they posted threads like this and this, which were marked as "feature requests" by Bitwarden. Fortunately, Bitwarden, too, has an option to increase the number of client-side iterations. You need to go to the web vault → click on your account picture at the top right → Account SettingsSecurity (left panel) → Keys tab and increase the number of iterations.
 
  • #126
Wrichik Basu said:
As mentioned earlier in the thread, the vault of the users was breached, but the master password wasn't, since it's not stored.
The details can be dense. The master password was as you said, but the encrypted passwords of sites stored in the vault were also stolen. Those do not have the same protections as the master password.

Recent news said that the hacker also got the user's backups. I'm scratching my head at the significance of that.

I was a long time satisfied user of LastPass, but now I switched to a different one. I read that they lost 60% of their customers in December. My reason for switching was their poor transparency, not their security.
 
  • #127
anorlunda said:
the encrypted passwords of sites stored in the vault were also stolen. Those do not have the same protections as the master password.
The encrypted fields are encrypted with 256-bit AES algorithm that requires the user's master password to decode. LastPass's defence is, it doesn't store the master password. But if the hacker can brute force decode someone's master password due to the low number of iterations, all encrypted passwords will be lost. If the master password was weak, then the user is responsible and not LastPass, as they have a policy of a minimum 16-character master password. Notably, this rule was enforced later, and many accounts still have an 8-character password and were never notified to change it. LastPass's defence: how can they notify the user if they don't even know the master password?
anorlunda said:
Recent news said that the hacker also got the user's backups. I'm scratching my head at the significance of that.
The vaults lost were the backups. In the August 2022, the hacker got some code and technical data, which they used to target another employee, and then got the credentials of the 3rd party cloud storage where LastPass stores their data centre's backup copies.

Apparently, LastPass took a lot of time, and probably invested in highly paid attorneys, to write an email which tells the users that they shouldn't be held responsible for what happened.
 
Last edited:
  • #128
anorlunda said:
The unencrypted URL info identifies the juicy targets for bad guys to try to crack your PW
Sorry, I missed this message too.

Yes, it does. But Google and their ilk also keep track of what I sites I visit. That ship has sailed. And it's not a good reason to use 'qwery' because password managers are insecure.

And I think I mentioned that there are security implications to encrypting the vault. If a trial key returns www.porn-u-copia.com, it is likely to be correct. If it returns 1&Ra6M0toCnEPNHi, how do you know?

Wrichik Basu said:
hash

A hash? The horror! The horror!

First, one thing is very clear. Lots or people, here and elsewhere, do not believe in public key encryption. The central idea is that your opponent already knows the key and already knows the algorithm. Keepiing them secret may slow her down, but is not necessary for security.

Now, if your master password is lousy, it does not matter what has and has not been hacked. One merely logs on with 'qwerty' and that's that. So expecting a PWM to protect you against a bad password is unrealistic.

Now, onto the vault. There are two options. One is to return the vault to anyone who asks for it. The other is to require partial information to release the vault. Those are your choices. A has like an 8-bit checksum will require on average over 100 attempts to download the vault. Nine bits and it's a thousand, and so on.

The cost of this is that the security of the master password is decreased by the same number of bits, My master password has about 60 bits of entropy, so decreasing this to 52 is not good, but survivable. If you use one of the most 1000 commonly used passwords, this will reduce the entrop to 2 bits. Not good.

No PWM will protect you from a lousy master password.

Classical cryptography theory says 'don't do this'. Why might you want to? By not giving the vault to just anyone, you can slow an attacker down, and possibly identify the threat. So while such a design might be formally less secure, it may be more secure in practice.

There is a lot I don't like about the LastPass design, but I recognize that there are design choices to be made and these choices have their pros and cons. Critics getting the vapors because the chosen design has a downside strikes me as unserious.

Further, discouraging people from using a PWM and a good password because its not perfect does not help them if they go back to using qwerty everywhere,
 
  • Like
Likes fluidistic and anorlunda
  • #129
LastPass announced some more details today. Three interesting facts:

1. One exploit was a company laptop,
2. One exploit was a cloud-based backup. (I don't know why this wasn't encrypted)
3. Information from the two exploits was combined (so probably a single actor).
 
  • #130
  • Wow
Likes Wrichik Basu
  • #131
fluidistic said:
A flaw in keepass allows one to retrieve the master password: https://nvd.nist.gov/vuln/detail/CVE-2023-32784. The fix will be available to the masses in July.

Thankfully it,doesn't affect keepassxc.
From the GitHub repo containing the proof-of-concept of the vulnerability:

What can you do​

First, update to KeePass 2.54 or higher once available. Second, if you've been using KeePass for a long time, your master password (and potentially other passwords) is likely in your pagefile/swapfile and hibernation file. Depending on your paranoia level, you can consider these steps to resolve the issue:
  • Change your master password
  • Delete hibernation file
  • Delete pagefile/swapfile (can be quite annoying)
  • Overwrite deleted data on the HDD to prevent carving (e.g. Cipher with /w on Windows)
  • Restart your computer
Or just overwrite your HDD and do a fresh install of your OS.
 
  • #133
Is this a statement about password manager security or of crypto-wallet security?

In real-world banking, a PIN plus a card (two factor right there) can get a few hundred dollars. A check and a signature up to about $10,000. Above $10,000 and it's a check, a signature, and at least a phone call. (Three factor) I have a bond ladder set up, and every week > $10,000 comes in and goes out, and every week my bank files a report on that with the feds.

But crypto? Guess the secret word and you have access to whatever is there.
 
  • #134
Vanadium 50 said:
Is this a statement about password manager security or of crypto-wallet security?

In real-world banking, a PIN plus a card (two factor right there) can get a few hundred dollars. A check and a signature up to about $10,000. Above $10,000 and it's a check, a signature, and at least a phone call. (Three factor) I have a bond ladder set up, and every week > $10,000 comes in and goes out, and every week my bank files a report on that with the feds.

But crypto? Guess the secret word and you have access to whatever is there.
Almost. There's something called BIP39 standard which was proposed back in 2013, a few years after Bitcoin was born, which consist in generating a private key (complex looking private key) from a series of generally either 12 or 24 words, taken out from a list of 2000 words. (see there for the interested: https://www.blockplate.com/pages/bip-39-wordlist).
Many crypto people use this standard to keep their funds safe. They tatoo the secret words on steel, or paper, etc. This is not very secure because if someone else sees their list of words, they have access to the funds.
However it is possible to use a passphrase on top of the list of words, consisting of a combination of any character or number in such a way that in order to retrieve your funds (your private key), you need both your list of words and your passphrase. You can then physically hide your list of words, and keep your passphrase in an encrypted password manager's vault. This way a hacker would have to hack you both physically and computationally to retrieve your funds. This is much more secure than using a list of words.
The advantage over banks is that you can transfer your funds whenever you want, quicker than with a bank. Not a big advantage you may say, fine enough. But it's not trivial that banking is safer than this method, to me, either.
 
  • #135
I don't see this as fundamentally different than a password. 2000 words is 11 bits, and 12 of them is 132 bits. That's roughly a 20 or 21 character password - better than is typical, and much better than "abc123" or "qwerty".

Now, if you are asked "What is the third word on your list?" this reduces the protection down to 2 characters, but it also adds protection against interception. If someone finds out the 3rd word on your list is "gallon" it doesn't help them if next time they are asked the 6th word on the list.

However, I think people are learning that the risk in crypto is not your enemy, but your friend. The people who run the exchanges etc. are at least as likely to steal from you as an outside bad actor.

Back to the topic at hand, LastPas has just announced that they will require master passwords to be 12 characters. So protecting your zillion-charachter random string with "qwerty" is a thing of the past.
 
  • #136
Vanadium 50 said:
I don't see this as fundamentally different than a password. 2000 words is 11 bits, and 12 of them is 132 bits. That's roughly a 20 or 21 character password - better than is typical, and much better than "abc123" or "qwerty".
A physical ''cold wallet'' stores your list of 12 words, i.e. password (so can be hacked if stolen), which is bad security wise. The passphrase however isn't. And it needs not to be made of words. It has to be typed by the user, either on their dedicated hardware (safest way, since not linked to the Internet), or on a computer (riskier). I think this is pretty secure. But if one gets drunk or something like that, maybe it's possible to retrieve the funds without too much troubles.
Vanadium 50 said:
Now, if you are asked "What is the third word on your list?" this reduces the protection down to 2 characters, but it also adds protection against interception. If someone finds out the 3rd word on your list is "gallon" it doesn't help them if next time they are asked the 6th word on the list.
I try to follow you, but this is over my head. Why would the knowledge of a word on a 12 words list reduce the protection to essentially 0? And what do you mean by interception?
Vanadium 50 said:
However, I think people are learning that the risk in crypto is not your enemy, but your friend. The people who run the exchanges etc. are at least as likely to steal from you as an outside bad actor.
I agree. It also doesn't make sense to keep your cryptos in a centralized exchange if the goal is to own your own money (something banks fail at, too)
Vanadium 50 said:
Back to the topic at hand, LastPas has just announced that they will require master passwords to be 12 characters. So protecting your zillion-charachter random string with "qwerty" is a thing of the past.
I'll go for qwertyqwerty.
 
  • #137
If you have an un-secure channel and an eavesdropper catches the password exchange, now he has your password. If the exchange is not "what is your password?" but "what is the third password on your list?" interception does the bad actor no good if the next exchange is :what is the sixth word on your list?"

There are in fact more secure ways to do even this, but the basic idea is that someone can reveal things about one's password to prove she knows it, without revealing the actual password. If you like, given a password P and a challenge C, there is a function f(C,P) the produced the response R If someone knows P, they can always provide the correct R for any given C, and if the system is designed well, this provides no help in determining the correct R for a different C.

fluidistic said:
I'll go for qwertyqwerty.
It isn't the password manager's fault if someone picks a lousy password. You can't fix stupid.
 
  • #138
Vanadium 50 said:
If you have an un-secure channel and an eavesdropper catches the password exchange, now he has your password. If the exchange is not "what is your password?" but "what is the third password on your list?" interception does the bad actor no good if the next exchange is :what is the sixth word on your list?"
There is no password exchange when communicating with a cold wallet. The device gets some transaction to sign (coming from the internet computer machine), it signs it if you physically approve it, and sends the signed file back to the computer. The private key is generated on the cold wallet hardware and is never transmitted to the internet computer.
If you take a screenshot of your seedphrase however, or store it on an internet connected computer....

Vanadium 50 said:
There are in fact more secure ways to do even this, but the basic idea is that someone can reveal things about one's password to prove she knows it, without revealing the actual password.
This is a zero knowledge proof, right? I have many questions related to this, I constantly think about posting them on PF.
Vanadium 50 said:
If you like, given a password P and a challenge C, there is a function f(C,P) the produced the response R If someone knows P, they can always provide the correct R for any given C, and if the system is designed well, this provides no help in determining the correct R for a different C.It isn't the password manager's fault if someone picks a lousy password. You can't fix stupid.
Yep. I was just kidding.
 
  • #139
Yes, I was talking about so-called zero-knowledge proofs.

Fundamentally, the problem is that we have two ways to establish identity: something you have, and something you know. "Something you have" can be lost, stolen, or forged. "Something you know" can be forgotten or revealed. In that environment, one cannot build a perfect system: one that always lets authorized people in and never lets unauthorized people in.

Password managers are not perfect, but for the vast majority of people they are better than not using them.
 
  • #140
Vanadium 50 said:
Yes, I was talking about so-called zero-knowledge proofs.

Fundamentally, the problem is that we have two ways to establish identity: something you have, and something you know. "Something you have" can be lost, stolen, or forged. "Something you know" can be forgotten or revealed. In that environment, one cannot build a perfect system: one that always lets authorized people in and never lets unauthorized people in.

Password managers are not perfect, but for the vast majority of people they are better than not using them.
My understanding is that you can establish a system that involves both something you have and something you know, at the same time. Either of them isn't sufficient to "unlock" your secret treasure. The something you have might be that 12 or 24 words list that is used (partly) to retrieve your private key. You can have it at different physical places to avoid any fire, nuke and accidents. If someone finds it, they won't be able to retrieve your funds, even though they are 1 step closer to do so, they are still too far. It can also be stored in a "cold wallet". If you use it that way, I see no obvious weakness nor threat of losing it.
Then there is the something you know, the only thing that you should really know. Not your birthday nor your name, but your password to decrypt your password's manager's vault. I assume some people might keep a copy on a physical object in case they have a terrible accident and want their families to retrieve their funds. In that vault there should be a passphrase that must be used in conjunction with your 12 words list in order to access your treasure. Overall the scheme is not perfect, but not bad, IMO.

Agreed for your last sentence.
 
  • #141
Having one thing and knowing one thing is not inherently better or worse than knowing two things or having two things.

You can still lose or forget things. Many "security experts" are so worried about a bad actor coming in and depriving you of your stuff that they do not think about the risk of losing or forgetting the key, which also deprives you of use of your stuff.

The two solutions for this would be a "master key" which unlocks everything, which now has the risk that the master key can be stolen, and am authentication system that requires M out of N keys. As mention earlier, bank transactions sort of do this already.
 
  • #142
Well, I am likely to switch from LastPass.

It's too secure. :smile: It's locked me out of my account several times. The issue is that it seems to be very fussy about using a YubiKey. You need to give your master password, wait for the YubiKey prompt, tell it not to use the YubiKey (!) but to use a different MFA, then remove and replace the YubiKey, and then enter the PIN and touch the YubiKey. You have five shots to get this right, and in the right order.

My LastPass support ticket has been in the works for a week. I don't think they even understand the symptoms yet. There is a one-day turnaround, and every day they want a screenshot or description of something that has already been described. There is no "try this" from them at this time.

Unless there is a fast turnaround, I think I'll be switching.
 
  • Wow
  • Informative
Likes symbolipoint and phinds
  • #143
I'm wondering if the popularity of Password Security Software is based on angst, personal insecurity, corporate decrees, or actual need... as perhaps national security reasons.

A FIrewall/Virus Scanner/Sandbox approach is quite protective... and A LOT less intrusive!
 
  • #144
Tom.G said:
A FIrewall/Virus Scanner/Sandbox approach is quite protective... and A LOT less intrusive!
Huh?

They do different things.

I don't want to use the same password for an online store as my bank. If the store has a security leak, I don't want to give the crooks access to my bank account too. Further, I want to use more secure passwords. Qwerty is a bad passsword. B4y%mnyHCgrcUAWH is better. Well, at least it used to be before this post. A password manager makes it easy to use stronger passwords.
 
  • #145
Update: LastPass asked me if I wanted to give up troubleshooting. They haven't yet said "Try X and let us know what happens". (Other than "reinstall everything and see if it helps" which I did before I contacted them.
 
  • #146
Vanadium 50 said:
Huh?

They do different things.

I don't want to use the same password for an online store as my bank. If the store has a security leak, I don't want to give the crooks access to my bank account too. Further, I want to use more secure passwords. Qwerty is a bad passsword. B4y%mnyHCgrcUAWH is better. Well, at least it used to be before this post. A password manager makes it easy to use stronger passwords.
Ahh, OK.

I interpreted your use of passwords as when you operate locally, as booting or running specific software. I agree passwords are useful and necessary when interacting with various sites that have personal information.

Sorry for the confusion.

Cheers,
Tom
 
  • #147
Vanadium 50 said:
They haven't yet said "Try X and let us know what happens"
Well, they just did. They said to shut all the MFA off except for YubiKey and see what happens. What happens is exactly what you expect - I was locked out.

1Password? BitWarden?
 
  • #148
LastPass tech suppoty tried to blame YubiKey, but YubiKey tests all pass. They are back to "disable MFA"...days pass.." enable MFA"....days pass. It's really hard to conclude that anyone there has a clue.

Any suggested alternatives?
 
  • #149
Vanadium 50 said:
Any suggested alternatives?
Don't do anything on-line that is sensitive enough to require a password!

(I know, not real practical/convenient for many folks.)
 
  • #150
Yeah, that's not really practical.
 

Similar threads

Back
Top