You read the part discussing the assurances virtually all password managers provide -- you know, where they say even in the event a server is compromised, the "zero knowledge design prevents vaults from being decrypted -- right? How is it overselling for researchers to thoroughly and with incontrovertible evidence debunk all that misleading marketing gimmickry?While I appreciate anyone bringing security issues to light and making security products better, I have to say that sometimes researchers do oversell their findings. This comes close to the old maxim that once someone has physical access to hardware you're toast.
There really is no such thing as total security. Now if I was someone a lot more important than I am, I'd worry about state-level actors managing a total server compromise of Bitwarden, and targeting my vault for extraction. As it is.. this is not a threat-scenario I lie awake worrying over.
Edit: Also I do support the recommendation of KeePass if you really do need that extra security. Just be very sure you have thought through all the potential issues with syncing it yourself. It can be the most secure option - but if you don't know what you're doing it's probably not.
It's important to note that all of the Bitwarden attacks appear to be predicated on enterprise/group-level memberships. For individual users, there does not appear to be a corresponding vector.
That being said, no matter what a service says: if their server is compromised, I'm going to change my master password immediately, and assume that every password and login I have has been compromised.
Syncthing uses encryption with pre-accepted device keys for syncing across the Internet, so there's no need for a VPN and I expect the app would alert you if a remote device started presenting a different key just like if the certificate didn't match for an HTTPS website.And that is great, I'm not going to talk bad about that. You've got a solution that works for you and that you trust, and I absolutely applaud that.
For me though, this is added risk: how about when I'm not in range of the other devices to update the vault? Am I updating over the open internet via syncthing, or am i using a VPN on every device? Do I run that VPN? If I do, what if my maintenance isn't perfect and the VPN connection goes down?
I do run several home servers and considered a self hosted solution. I ended up deciding that I didn't want to rely on -me- as the primary fault location for all of my passwords. Again, I'm not discounting anyone that does choose that, because it's a different decision tree for everyone's own situation, but it is food for thought.
New research shows that these claims aren’t true in all cases, particularly when account recovery is in place or password managers are set to share vaults or organize users into groups. The researchers reverse-engineered or closely analyzed Bitwarden, Dashlane, and LastPass and identified ways that someone with control over the server—either administrative or the result of a compromise—can, in fact, steal data and, in some cases, entire vaults. The researchers also devised other attacks that can weaken the encryption to the point that ciphertext can be converted to plaintext.
The attack, however, requires the user to log in to LastPass with the browser extension, not the standalone client app.
I use the same tool, and have always loved the fact that it does not attempt to keep your passwords "in the cloud".I've been using PasswordSafe since I first found it on Bruce Schneier's site over 25 years ago. It's now open source and I feel it's well maintained. ...
My offhand guess would be it is that it would be similarly vulnerable to spoofed keypairs, if you can spoof the keys in the first place.I'd quite like to see Apple's Passwords app subjected to the same sort of analysis, since it also has a 'share passwords with family' feature.
I was also confused by this paragraph. If you check the source paper, there is actually a whole annex about 1password.Literally came here to post the same question.
@dangoodin great article, but I think this paragraph could use a little touch up.
Apple's Passwords app is new, but it's just a frontend to the Apple Keychain that's been around since Mac OS 8.6. I'm not sure when Keychain was extended into iCloud, but even that's been a thing for a long time. So whilst I can see where your concern is coming from, it's misplaced.One or two people have mentioned Apple's Passwords app. IMO it's way too new a product to mess with, even on the level of simple things like accurate import/export to other trusted apps.
What do you mean by this? In order for an attacker to put a compromised 1Password binary on my Mac or iPhone, you can’t just break into the download server and place a tainted binary there, because it would break the the app signature. Instead, they’d have to compromise 1Password’s development environment (which is not the same as the “server”) and sneak some bad code onto their internal repository, hoping the developers don’t notice it before they unwittingly sign and ship the next version. A successful attack in this way is possible via e.g., supply chain attacks onto whatever IDE is being used by 1Password, but it would be rather difficult and dependent on luck.To me the main downside of 1Password and the like is no control over software updating. If their server gets compromised, they can send you a bad version of the software that records and uploads the password needed to access your vault.
The announcement that local vaults would be discontinued was the impetus for me moving away from 1Password (which I'd been using since it was initially promoted in 2007 as part of MacHeist II).This is exactly the sort of development I feared when 1Password announced they were doing away with local vaults. I really wish they could find a way to make that an option for users who want it, even if it were to still default to a cloud setup. Id prefer to know the bounds of my attack surface.
iCloud Keychain was one of the big new features of iOS 7 (and was announced at WWDC 2013).Apple's Passwords app is new, but it's just a frontend to the Apple Keychain that's been around since Mac OS 8.6. I'm not sure when Keychain was extended into iCloud, but even that's been a thing for a long time. So whilst I can see where your concern is coming from, it's misplaced.
I've been on self-hosted VaultWarden as well and it wasn't hard to set up. DNS was the hardest part actually.The announcement that local vaults would be discontinued was the impetus for me moving away from 1Password (which I'd been using since it was initially promoted in 2007 as part of MacHeist II).
I migrated to a self-hosted VaultWarden instance, which works pretty much identically. It was one of the least-painful software transitions I've made.
Most hacks (esp. those aimed at consumers) are social hacks. Basically, keep OS and apps updated, don't download anything from unfamiliar sites, and don't routinely sign in as "admin". After that, don't click links and don't call numbers listed on anything that comes in unsolicited. Finally, never answer calls from unrecognized numbers - let them leave voice messages. That's 95% safe right there?I am extremely mega neurotic. I log into non-critical things on my main workstation but I keep a ThinkPad X230 corebooted with Qubes OS and Keepass set via key file + yubikey + password and I have separate VMs there for banking, email and anonymous browsing. I also only log into my gmail (which I use little since I started hosting my own) and apple email there in separate VMs too.
The laptop itself is backed up encrypted to my local NAS, encrypted, and from there, to Amazon Glacier, encrypted before sent. A yubikey-less copy of the password database is stored at a friend's 100km from here.
And I use also random emails, all tracked within keepass and hosted on my own server, to create single-use logins for different services.
I've witnessed too many cases of identity theft affecting my elderly relatives and I just can't otherwise.
Good point - I had forgotten about the feature where you can share a wifi network password with someone nearby. I've actually used that a couple of times when on holiday with friends. It would make sense if that was just a one-off 'share a copy of this password now' rather than granting semi-permanent access to a password saved in a vault. But it would be nice to know whether that is actually what Apple has implemented.There is another sharing mode that relies on Airdrop for wifi networks and other passwords, and the recipient doesn't have to be in your iCloud family but they do need to be in your contacts. That also relies on pre-exchanged iCloud public keys and proximity.
I suspect there might be a bit more to the app than that: for example, the Passwords app has icons, which were not in iCloud Keychain. And one of the attacks described in the article uses a weakness in the icon feature to get in.iCloud Keychain was one of the big new features of iOS 7 (and was announced at WWDC 2013).
The new Passwords frontend is basically just un-burying the functionality from the Settings app.
Of course the wrench attack is easily detectable. At the point it is being used against you, that matters not a bit. Your password or your life. Choose quickly, either way it is likely game over.I get that it can be annoying. It’s just, for some reason articles like this one call “Cloud Password Managers” “Password Managers.” So, keepass users probably feel the need to point out that this isn’t a problem with Password Managers, it is a problem with Cloud. Complain to the author, not the commenters with the valid and obvious correction.
This doesn’t seem fair. Most people can’t memorize enough high quality passwords to make this a practical option.
The wrench attack might work. But it has the downside of being easily detectable.
I'm in the same boat, using OneDrive for my KeyPass files. Good luck brute forcing my 15 digit basically-random master password.I've been using Keepass for years. I back up the one data file to my external drive and to my cloud drive (where it syncs to my phone). It's exactly how I back up my other data files (spreadsheets, documents, photos). Theoretically an easy and straightforward process.
Where I can get tripped up is when I add/update one password on Keepass using, say, my laptop - and then on the same day add/update another password on Keepass with my phone. Oops, now the nightly synching isn't straightforward anymore. As a single user sharing with no one, I just need to be careful. But I can certainly see a potential mess for a family/group trying to keep in sync!
I use KeepassXC (desktop) / KeepassDX (mobile), storing the encrypted db on my personal nextcloud server. It works seamlessly, with no conflicts. The only cloud I ever trust is my own cloud.I just want to note that using Syncthing to sync a KeePass database can be done "serverless". Even if I do personally run Syncthing on my home server, you could simply run it on three or four devices and have a decent amount of data safety. If I took my home server out of the mix my password databases would still be on four devices.
This sounds not so unlikely to me. If I were a malicious actor, I'd certainly target the server infrastructure of the most popular password managers. If this is also the case with chat apps like Signal, I'd be worried too. In many countries, the government is a very likely threat actor. You don't have to be a professional spy.3. You can't protect against everything. It's okay to say that you are not accounting for the entire Bitwarden server infrastructure being rooted and malicious binaries rolled out to them.
This is the system I use. To add a little bit of extra security, I keep the password vault file (which changes every time I add a new password or change an existing password) on OneDrive, but I encrypt that file with both a master password and a static keyfile, which doesn't change. The static keyfile I install on all my devices locally - that keyfile is never ever stored in the cloud storage service. Because the keyfile is static, a one-time installation when I set up a new device is not significantly inconvenient.The whole point of Keepass is you don't need to care about how you do the synching. You can email it to yourself, stick it on a thumbdrive, or whatever and it is secure. I just use Keepass with Microsoft Onedrive because it just works and I don't have to think about it.
To me the main downside of 1Password and the like is no control over software updating. If their server gets compromised, they can send you a bad version of the software that records and uploads the password needed to access your vault. That said I usually recommend most people to do the cloud password manager over Keepass because as someone else posted, the server compromise risk is a lot lower than all the other password related security risks for normal people.
For this reason I prefer a more immediate sync process for KeePass files (sync immediately on save). Can SyncThing be configured with file system watchers to do that?I've been using Keepass for years. I back up the one data file to my external drive and to my cloud drive (where it syncs to my phone). It's exactly how I back up my other data files (spreadsheets, documents, photos). Theoretically an easy and straightforward process.
Where I can get tripped up is when I add/update one password on Keepass using, say, my laptop - and then on the same day add/update another password on Keepass with my phone. Oops, now the nightly synching isn't straightforward anymore. As a single user sharing with no one, I just need to be careful. But I can certainly see a potential mess for a family/group trying to keep in sync!
It matters after, though. Assuming it isn’t “game over” (since, in that case, nothing matters), knowing your accounts have been stolen gives you a chance of recovery at least.Of course the wrench attack is easily detectable. At the point it is being used against you, that matters not a bit. Your password or your life. Choose quickly, either way it is likely game over.
It makes sense if you read the paragraph before it.Literally came here to post the same question.
@dangoodin great article, but I think this paragraph could use a little touch up.
They analyzed a lot of password managers that had the same vulnerabilities as the top ones but for some reason they’re only allowed to mention 1Password.I’m confused by this sentence about 1Password. What’s is it trying to say? That they didn’t analyze it but it would be subject to the same attacks? I feel like a sentence is missing.
Maybe I’m just not getting something obvious.
... LassPass suffered breaches in 2015 and 2022 ...