Hi, Jörg -
One of the challenges we've always had in prioritizing this work is how
hard it is to evaluate the user risk involved, because the threat model
in this case involves a third party having full access to a target
victim's computer while they're logged in but also choosing not to use
any other, often simpler attack vectors available in that situation.
One of our principal engineers recently made a very similar observation,
when discussing our policies about instrumenting private browsing mode:
"Every scenario we have looked at has been making contrived assumptions
about what the local attacker is willing/able to do (e.g. they have full
access to the user’s computer over an extended period of time, but they
are unable to install any spying software on their machine)."
With that in mind, we've long held the position that the responsibility
for protecting the bytes on the disk from local malfeasance is the
responsibility of the OS via local disk encryption, filesystem
permissions and user authentication, not the browser.
That's not a spectacular argument, but our engineering resources are
finite and in the face of other security issues we definitely need to
manage, like Spectre - which absolutely does have some spectacular
arguments in its corner - that argument has always been enough to move
this bug far enough down the priority list that we never get to it.
Having said that, I'm definitely sympathetic to the position that if
we're offering to encrypt something at all, we shouldn't be using weak
or dated encryption for the job however remote we feel the related risks
are.
We're planning to replace the password manager in Firefox with something
that's much better suited to modernity; better sync, Monitor
integration, even strong-password generation, and - while I don't want
to guarantee anything - I know that solving the encryption-at-rest issue
is on that team's roadmap too. There's a lot going on there, the team
that's working on it is pretty excited about it, and from what I
understand wants to get it out the door well before the end of the year.
Hope that helps.
- mhoye
------ Original Message ------
From: "Jörg Knobloch via governance" <governance@lists.mozilla.org>
To: "Mitchell Baker" <mitch...@mozilla.com>; "governance"
<governance@lists.mozilla.org>
Sent: 2019-04-05 10:02:39 AM
Subject: The master password debacle: What is behind it?
Hi Mitchell,
I am writing to you as a long time Firefox user and Mozilla contributor
for many years.
In the past years we have seen an amazing amount of innovation in
Firefox to make it a faster, more stable, better looking and overall
much better browser. A brilliant team of highly skilled engineers
supported by a dedicated community of volunteers have taken Firefox to
new heights.
That said, fixing a long-standing issue, the highly insecure master
password, has fallen by the wayside. As a brief summary: If the user
chooses, the master password protects site passwords, including access
to webmail, and personal certificates in Firefox. Needless to say that
gaining access to those could have some disastrous consequences. It is
well-known that the master password of Firefox can be cracked in 1-2
minutes with very basic hardware and skill set. The bug is known since
2009[1][2] and Firefox has received bad press about it, some references
here[3][4][5]. I last "poked" the issue here[6] on dev-platform with no
success. Skimming the discussion in the bugs, the consensus appears to
be: Yes it's an issue, yes, it should be fixed, but no action follows.
So I have been wondering what is behind this. Is there a lack of
governance structures within Mozilla or lack of management structures
within the Mozilla Corporation that has not allowed for this issue to
be escalated? It would be hard to believe that Mozilla engineers do not
have the skills to fix what appears to be a very basic problem glancing
at the bugs I quoted. Even if so, an external contractor could be hired
for this task.
Or is this backdoor left open due to some undisclosed obligation? One
could start to believe this when reading the following comment[6, 2nd
in thread]: "Yes, we're looking at it, but don't have a detailed plan
or schedule to share yet". In this case it would be desirable to
officially declare the feature as insecure or even disable it. After
all, the fourth principle of the Mozilla Manifesto reads "Individuals’
security and privacy on the internet are fundamental and must not be
treated as optional".
With kind regards,
Jörg, user and contributor from Berlin, Germany.
[1] https://bugzilla.mozilla.org/show_bug.cgi?id=524403
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=973759
[3]
https://www.bleepingcomputer.com/news/security/firefox-master-password-system-has-been-poorly-secured-for-the-past-9-years/
[4]
https://nakedsecurity.sophos.com/2018/03/20/nine-years-on-firefoxs-master-password-is-still-insecure/
[5]
https://fossbytes.com/firefox-master-password-weak-encryption-brute-force-one-minute/
[6]
https://groups.google.com/d/msg/mozilla.dev.platform/k2g6G2F3xo0/KLICUiJSAQAJ
_______________________________________________
governance mailing list
governance@lists.mozilla.org
https://lists.mozilla.org/listinfo/governance
_______________________________________________
governance mailing list
governance@lists.mozilla.org
https://lists.mozilla.org/listinfo/governance