Jump to content

Password manager

From Wikipedia, the free encyclopedia
(Redirected from Online password manager)
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

A password manager is a software program to prevent password fatigue by automatically generating, autofilling and storing passwords.[1][2] It can do this for local applications or web applications such as online shops or social media.[3] Web browsers tend to have a built-in password manager. Password managers typically require a user to create and remember a single password to unlock to access the stored passwords. Password managers can integrate multi-factor authentication.

History

The first password manager software designed to securely store passwords was Password Safe created by Bruce Schneier, which was released as a free utility on September 5, 1997.[4] Designed for Microsoft Windows 95, Password Safe used Schneier's Blowfish algorithm to encrypt passwords and other sensitive data. Although Password Safe was released as a free utility, due to export restrictions on cryptography from the United States, only U.S. and Canadian citizens and permanent residents were initially allowed to download it.[4]

As of October 2024, the built in Google Password Manager in Google Chrome became the most used password manager.[citation needed]

Types

Browser-based

These are built directly into web browsers like Chrome, Safari, Firefox, and Edge. They offer convenient access for basic password management on the device where the browser is used. However, some may lack features like secure syncing across devices or strong encryption.

Local

These are standalone applications installed on a user's device. They offer strong security as passwords are stored locally, but access may be limited to that specific device. Popular open-source options include KeepassXC, KeePass and Password Safe.

Cloud-based

These store passwords in encrypted form on remote servers, allowing access from supported internet-connected devices. They typically offer features like automatic syncing, secure sharing, and strong encryption. Examples include 1Password, Bitwarden, and Dashlane.

Enterprise

Designed for businesses, these cater to managing access credentials within an organization. They integrate with existing directory services and access control systems, often offering advanced features like role-based permissions and privileged access management.

Hardware

These physical devices, often USB keys, provide an extra layer of security for password management. Some function as secure tokens for account/database access, such as Yubikey and OnlyKey, while others also offer offline storage for passwords, such as OnlyKey.

Vulnerabilities

Weak vault storage

Some applications store passwords as an unencrypted file, leaving the passwords easily accessible to malware or people attempted to steal personal information.

Master password as single point failure

Some password managers require a user-selected master password or passphrase to form the key used to encrypt passwords stored for the application to read. The security of this approach depends on the strength of the chosen password (which may be guessed through malware), and also that the passphrase itself is never stored locally where a malicious program or individual could read it. A compromised master password may render all of the protected passwords vulnerable, meaning that a single point of entry can compromise the confidentiality of sensitive information. This is known as a single point of failure.

Device security dependency

While password managers offer robust security for credentials, their effectiveness hinges on the user's device security. If a device is compromised by malware like Raccoon, which excels at stealing data, the password manager's protections can be nullified. Malware like keyloggers can steal the master password used to access the password manager, granting full access to all stored credentials. Clipboard sniffers can capture sensitive information copied from the manager, and some malware might even steal the encrypted password vault file itself. In essence, a compromised device with password-stealing malware can bypass the security measures of the password manager, leaving the stored credentials vulnerable.[5]

As with password authentication techniques, key logging or acoustic cryptanalysis may be used to guess or copy the "master password". Some password managers attempt to use virtual keyboards to reduce this risk - though this is still vulnerable to key loggers[citation needed] that take the keystrokes and send what key was pressed to the person/people trying to access confidential information.

Cloud-based storage

Cloud-based password managers offer a centralized location for storing login credentials. However, this approach raises security concerns. One potential vulnerability is a data breach at the password manager itself. If such an event were to occur, attackers could potentially gain access to a large number of user credentials. A 2022 security incident involving LastPass exemplifies this risk.[5]

Password generator security

Some password managers may include a password generator. Generated passwords may be guessable if the password manager uses a weak method of randomly generating a "seed" for all passwords generated by this program. There are documented cases, like the one with Kaspersky Password Manager in 2021, where a flaw in the password generation method resulted in predictable passwords.[6][7]

Others

A 2014 paper by researchers at Carnegie Mellon University found that while browsers refuse to autofill passwords if the login page protocol differs from when the password was saved (HTTP vs. HTTPS), some password managers insecurely filled passwords for the unencrypted (HTTP) version of saved passwords for encrypted (HTTPS) sites. Additionally, most managers lacked protection against iframe and redirection-based attacks, potentially exposing additional passwords when password synchronization was used across multiple devices.[8]

Blockage

Various high-profile websites have attempted to block password managers, often backing down when publicly challenged.[9][10][11] Reasons cited have included protecting against automated attacks, protecting against phishing, blocking malware, or simply denying compatibility. The Trusteer client security software from IBM features explicit options to block password managers.[12][13]

Such blocking has been criticized by information security professionals as making users less secure.[11][13] The typical blocking implementation involves setting autocomplete='off' on the relevant password web form. This option is now consequently ignored on encrypted sites,[8] such as Firefox 38,[14] Chrome 34,[15] and Safari from about 7.0.2.[16]

See also

References

  1. ^ Waschke, Marvin (2017). Personal cybersecurity : how to avoid and recover from cybercrime. Bellingham, Washington: Apress. p. 198. doi:10.1007/978-1-4842-2430-4. ISBN 978-1-4842-2430-4. OCLC 968706017.
  2. ^ "Password Managers - Information Security Office - Computing Services". Carnegie Mellon University. Retrieved 2024-07-07.
  3. ^ "What is a Password Manager? - Definition from Techopedia". Techopedia.com. Retrieved 2022-12-14.
  4. ^ a b "Counterpane Systems Brings the Security of Blowfish to a Password Database". Counterpane Systems. Archived from the original on 1998-01-19. Retrieved June 24, 2023.
  5. ^ a b Valiaugaitė, Inga (2022-07-13). "Are Password Managers Safe to Use in 2024?". Cybernews. Archived from the original on 2024-03-24. Retrieved 2024-03-31.
  6. ^ Claburn, Thomas (2021-07-06). "Kaspersky Password Manager's random password generator was about as random as your wall clock". The Register. Archived from the original on 2024-03-07. Retrieved 2024-03-31.
  7. ^ Arghire, Ionut (2021-07-07). "Kaspersky Password Manager Generated Passwords That Could Quickly Be Brute-Forced". SecurityWeek. Archived from the original on 2023-06-02. Retrieved 2024-03-31.
  8. ^ a b "Password Managers: Attacks and Defenses" (PDF). Retrieved 26 July 2015.
  9. ^ Wright, Mic (16 July 2015). "British Gas deliberately breaks password managers and security experts are appalled". TNW. Retrieved 7 July 2024.
  10. ^ Reeve, Tom (15 July 2015). "British Gas bows to criticism over blocking password managers". Retrieved 26 July 2015.
  11. ^ a b Cox, Joseph (26 July 2015). "Websites, Please Stop Blocking Password Managers. It's 2015". Retrieved 26 July 2015.
  12. ^ "Password Manager". Retrieved 26 July 2015.
  13. ^ a b Hunt, Troy (15 May 2014). "The "Cobra Effect" that is disabling paste on password fields". Retrieved 26 July 2015.
  14. ^ "Firefox on windows 8.1 is autofilling a password field when autocomplete is off". Retrieved 26 July 2015.
  15. ^ Sharwood, Simon (9 April 2014). "Chrome makes new password grab in version 34". Retrieved 26 July 2015.
  16. ^ "Re: 7.0.2: Autocomplete="off" still busted". Retrieved 26 July 2015.