Password list security

mikeymikec

Lifer
May 19, 2011
18,628
11,342
136
I'm mulling over whether I should change my current password storage system.

At the moment I just have a collection of unencrypted files on my computer containing passwords on my home + business computer (self-employed). My only concern is that it's apparently becoming more common for break-ins to occur specifically for password lists (paper or electronic).

My system at the moment would require the person to know the names and location of the files (the main one has an uninformative file name, and is not stored in an obvious place).

I'm not happy with the idea of using password-storage-software because it's an extreme question of trust with the developers (in terms of both competence and honesty) and also the existence of such a piece of software on a victim's computer is a really obvious indicator of where the desired information is.

I'm considering using a TrueCrypt container as I have a fair bit of experience with TrueCrypt already and I'm pretty sure I can handle it without causing a catastrophic mistake resulting in me no longer having a record of the passwords I feel the need to keep a record of. I also like that TC doesn't keep a record of recently opened files. However, I haven't used TrueCrypt in this capacity before (ie. I want to quickly access a file then disconnect when I'm done, as leaving TC open and connected to the container and generally hibernating Windows would be A Bad Thing (tm). Any suggestions?

I have a Windows password set, FWIW.
 

smakme7757

Golden Member
Nov 20, 2010
1,487
1
81
If you don't mind storing an encrypted container in the cloud Lastpass is by far the most versatile and secure password management system available.
https://lastpass.com/

You save your passwords in a database locally, encrypt is locally, and a copy of the encrypted database is sent off to Lastpass so you can retrieve is whenever you want. The big bonus is that it will sync passwords across all your devices.

If you want to keep everything locally, then Keypass is a nice alternative:
http://keepass.info/

I use Lastpass.
 

balloonshark

Diamond Member
Jun 5, 2008
6,584
3,063
136
I use keepass because it stores everything locally like smakme mentioned.

I won't use lastpass because of the cloud storage and their headquarters are are located just outside of D.C. in the US. That might concern you if you keep up with the news.
 

Savatar

Senior member
Apr 21, 2009
230
1
76
I also like that TC doesn't keep a record of recently opened files.

While TrueCrypt can be set to not remember history of which volumes were mounted, most applications maintain a recent history list of their own for files they handle. So if you open word documents from the TrueCrypt container, for example, they will still show up in Word's recent history. So TrueCrypt doesn't really offer great 'recent history' protection... as file paths and names and so on are then recorded in an unencrypted manner on other parts of the system. You can complement this with something like CCleaner to remove recent history from several applications, which helps, but also is not a perfect solution. Just something to keep in mind.

TrueCrypt brings some interesting concepts to storing passwords because it could allow you to hide accounts on the hidden volume, so if someone forced you to get the password list, you could use the outer container instead (which would contain shell accounts). You can even still use an offline KeePass archive in addition to that (inside the containers).

For storing passwords, you might want to consider a combination of storage locally on your PC (or the cloud - though I would avoid that b/c it only increases the attack vector) and from a secondary source (offline document or something memorized). In this manner, even if the credential store is compromised, the attacker still might not be able to use the password to log on (since it only contains part of the data needed).
 

mikeymikec

Lifer
May 19, 2011
18,628
11,342
136
While TrueCrypt can be set to not remember history of which volumes were mounted, most applications maintain a recent history list of their own for files they handle. So if you open word documents from the TrueCrypt container, for example, they will still show up in Word's recent history. So TrueCrypt doesn't really offer great 'recent history' protection... as file paths and names and so on are then recorded in an unencrypted manner on other parts of the system. You can complement this with something like CCleaner to remove recent history from several applications, which helps, but also is not a perfect solution. Just something to keep in mind.

However, that would give away file names from inside the container (not the location of the container or anything else worth knowing). The only risk would be from temp files (if I used something more advanced than say Notepad).

TrueCrypt brings some interesting concepts to storing passwords because it could allow you to hide accounts on the hidden volume, so if someone forced you to get the password list, you could use the outer container instead (which would contain shell accounts). You can even still use an offline KeePass archive in addition to that (inside the containers).

That's something that intrigues me that I haven't yet looked into.
 

Savatar

Senior member
Apr 21, 2009
230
1
76
However, that would give away file names from inside the container (not the location of the container or anything else worth knowing). The only risk would be from temp files (if I used something more advanced than say Notepad).

That's something that intrigues me that I haven't yet looked into.

Most file names are actually very valuable and definitely worth knowing to an attacker or investigating entity, and it's worth knowing that it's mounted to a drive letter that doesn't exist on the system (hinting that the data is on an external drive like a USB stick or a TC volume). File names often give away the type of data, and a general description of the data... i.e. X: \Classified_Docs\2013\project_snoopy_presentation.pdf.

A social engineer or interrogator could then use this information to then inquire about "Project Snoopy". They deny knowing about it? Won't work now, because they have proof that an operator of the system should be familiar with it and can press harder. So it's not just the contents that are important.

However, file names often do actually give away their content too. Many questionable or otherwise shady files can be found by their original file name just by searching google. If you have the file name, in many cases, you may know exactly what was being viewed.
 

bononos

Diamond Member
Aug 21, 2011
3,911
172
106
.......
I'm not happy with the idea of using password-storage-software because it's an extreme question of trust with the developers (in terms of both competence and honesty) and also the existence of such a piece of software on a victim's computer is a really obvious indicator of where the desired information is.

I'm considering using a TrueCrypt container as I have a fair bit of experience with TrueCrypt already and I'm pretty sure I can handle it without causing a catastrophic mistake resulting in me no longer having a record of the passwords I feel the need to keep a record of. I also like that TC doesn't keep a record of recently opened files. However, I haven't used TrueCrypt in this capacity before (ie. I want to quickly access a file then disconnect when I'm done, as leaving TC open and connected to the container and generally hibernating Windows would be A Bad Thing (tm). Any suggestions?

I have a Windows password set, FWIW.

TC is great for encrypting whole volumes/partitions. If you just want something to keep your passwords secure lastpass/keepass is more ideal. Or something even simpler like locknote which is just one executable (no need to install). You will need to configure your antivirus/hips to allow locknote to overwrite itself since that behaviour is suspicious.
 

smakme7757

Golden Member
Nov 20, 2010
1,487
1
81
To be honest the best password management is easy password management. If you make it too difficult you will end up taking shortcuts. That's why password management software is so useful.

With regards to trusting the developer, why do you trust Truecrypt more than keepass or Lastpass?

No one has ever actually done a 100% analysis of the Truecrypt code. People just take it for granted that because it's "Open Source" (which it really isn't as you cannot edit the code because it's copyrighted) that's it's safe to use.

I don't trust Truecrypt anymore than i would trust Lastpass or Keepass, but all of those products will give me 100% protection from 99% of adversaries.
 

mikeymikec

Lifer
May 19, 2011
18,628
11,342
136
I don't trust Truecrypt anymore than i would trust Lastpass or Keepass, but all of those products will give me 100% protection from 99% of adversaries.

A standard commercial company structure has a vulnerability in the form of someone with sufficient authority being requested by an NSA-like organisation to insert a backdoor or vulnerability. The only ways that such a vulnerability would come to light would be if a researcher stumbles upon the vulnerability or an employee whistle-blows it.

With open source software the likelihood is somewhat higher that a developer would spot the problem, and the lack of central authority as well as the general interest in developing an honestly secure product gives me more confidence in it. Discussions regarding its development tend to be a matter of public record. NSA-like organisations don't like anything being a matter of public record either.

I'm not saying open source development is invulnerable to this method of compromise, but for example if someone inserted some compromising code, the rest of the development team are not inherently compromised as a result. In a small company, it's going to be a case of "like it or leave, and here's an NDA in either case".
 

lxskllr

No Lifer
Nov 30, 2004
57,986
8,223
126
I may have missed it, but there seems to be a misconception that KeePass is proprietary software. It's libre, and that's the reason I use it. I keep it backed up to my SpiderOak account so I can use it on the road.
 

mikeymikec

Lifer
May 19, 2011
18,628
11,342
136
I may have missed it, but there seems to be a misconception that KeePass is proprietary software. It's libre, and that's the reason I use it. I keep it backed up to my SpiderOak account so I can use it on the road.

Point taken. TBH, I hadn't checked.
 

PrincessFrosty

Platinum Member
Feb 13, 2008
2,300
68
91
www.frostyhacks.blogspot.com
You're approaching this the wrong way, security through obscurity is always a really bad idea and is always weaker. For example it's always better to have a good cryptographic lock on an obvious file/password than to store that file/password in plaintext somewhere and simply hide where that place is, that's a really, REALLY bad idea.

Cryptography is secure when implemented properly and there's plenty of decent password storage solutions out there which are used and trusted by lots of people, some already mentioned in this thread.
 

alangrift

Senior member
May 21, 2013
434
0
0
If you don't mind storing an encrypted container in the cloud Lastpass is by far the most versatile and secure password management system available.
https://lastpass.com/

You save your passwords in a database locally, encrypt is locally, and a copy of the encrypted database is sent off to Lastpass so you can retrieve is whenever you want. The big bonus is that it will sync passwords across all your devices.

If you want to keep everything locally, then Keypass is a nice alternative:
http://keepass.info/

I use Lastpass.

Lastpass had a leak this year didn't they?
 

Berliner

Senior member
Nov 10, 2013
495
2
0
www.kamerahelden.de
My system at the moment would require the person to know the names and location of the files (the main one has an uninformative file name, and is not stored in an obvious place).

No it really would not. Do you know that tools like grep and file-searching exist?

Go with TC, if you are already familiar with it.
 

smakme7757

Golden Member
Nov 20, 2010
1,487
1
81
Lastpass had a leak this year didn't they?
It depends on what you describe as a leak.

They had a network anomaly which was picked up by their IDS. They couldn't explain the activity so they urged users to changed their passwords.

They could have kept it a secret like everyone else. Lets face it nothing major has happened to any Lastpass customers that has been made public, so I guess this "Anomaly" turned out to be nothing.

They choose to go public and warn users. I'd bet things like this happen at least a few times a year to most other companies that just keep a lid on it.

Companies (even security companies) are not squeaky clean just because they have never had anything to report publicly? Most security breaches are reported by end users or hackers. It's very rare that a company comes out and lets people know before after the cat is out of the bag.

I suppose the big question is if it's a cause for concern? It's a hard question to answer because if Lastpass just kept their mouth shut we would have never known.
 
Last edited:

mikeymikec

Lifer
May 19, 2011
18,628
11,342
136
You're approaching this the wrong way, security through obscurity is always a really bad idea and is always weaker. For example it's always better to have a good cryptographic lock on an obvious file/password than to store that file/password in plaintext somewhere and simply hide where that place is, that's a really, REALLY bad idea.

This isn't a discussion regarding "security through obscurity versus ... everything else". Security does not have to involve one or the other.
 

jimhsu

Senior member
Mar 22, 2009
705
0
76
Lastpass does all encryption locally (with the plugin, or with javascript -- I recommend the plugin to mitigate possibilities of javascript hijacking attacks). If your computer is slow enough, you can actually see the encryption take place upon form submit. This is a big deal as far as password security is concerned. If you're sufficiently paranoid, you actually don't even have to use their site, or connect to the internet for that matter; the portable utility works similarily to KeePass.

As far as copy and pasting -- are you sure you don't have a trojan that's monitoring copy/paste operations right now? Autofilling doesn't solve that problem, but it helps against the more obvious attacks. Have you checked with a network sniffer that your utility of choice isn't making connections to remote servers? How about any hardware keyloggers? Concealed microphones for acoustic emissions? You can go on and on, but only you can determine what level of paranoia is "suitable" for you.
 
Last edited:

PrincessFrosty

Platinum Member
Feb 13, 2008
2,300
68
91
www.frostyhacks.blogspot.com
This isn't a discussion regarding "security through obscurity versus ... everything else". Security does not have to involve one or the other.

When someone is proposing a possible solution as to write down your passwords and simply store them somewhere obscure, then yes, actually it is a discussion about exactly that.

It's a general principle most professionals adhere to when considering security, not to rely on obscurity for security, that principle should be followed here as well.
 

sourceninja

Diamond Member
Mar 8, 2005
8,805
65
91
To be honest the best password management is easy password management. If you make it too difficult you will end up taking shortcuts. That's why password management software is so useful.

With regards to trusting the developer, why do you trust Truecrypt more than keepass or Lastpass?

No one has ever actually done a 100% analysis of the Truecrypt code. People just take it for granted that because it's "Open Source" (which it really isn't as you cannot edit the code because it's copyrighted) that's it's safe to use.

I don't trust Truecrypt anymore than i would trust Lastpass or Keepass, but all of those products will give me 100% protection from 99% of adversaries.


While you are current that you can't trust truecrypt just because it is open source. You are incorrect in stating you can't edit the code or make your own 'truecrypt' from the source.

Read the license yourself. http://www.truecrypt.org/legal/license it has a clause that allows you to take the code, edit it, and release it commercially or non-commercially.

I personally use lastpass. I find it it convenient and secure enough for my needs.
 

lxskllr

No Lifer
Nov 30, 2004
57,986
8,223
126
While you are current that you can't trust truecrypt just because it is open source. You are incorrect in stating you can't edit the code or make your own 'truecrypt' from the source.

Read the license yourself. http://www.truecrypt.org/legal/license it has a clause that allows you to take the code, edit it, and release it commercially or non-commercially.

I personally use lastpass. I find it it convenient and secure enough for my needs.

The licensing is iffy. It's not a free license, and it's not OSI approved. That shouldn't stop an individual from playing with the code, but "institutions" should be careful with its use. That's why it isn't included with most GNU/Linux distros.

Here's a discussion regarding the license...

http://lists.freedesktop.org/archives/distributions/2008-October/000276.html
 

ggadrian

Senior member
May 23, 2013
270
0
76
I use 1Password, it's easy to use and I can have it in all my devices. I don't know how sure it is, but for me it seems reasonably secure and easy to use.
 

John Connor

Lifer
Nov 30, 2012
22,757
617
121
I never use a password safe, I use a Mozilla based add-on called PWDHash developed by a guy at Stanford.
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |