1. Attachments are working again! Check out this thread for more details and to report any other bugs.

iCloud Keychain. Is it secure?

Discussion in 'Fred's House of Pancakes' started by daniel, Oct 9, 2013.

  1. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    I was reading about OS X Mavericks, due out soon, and one of the features touted is iCloud Keychain, for managing your log-ins and passwords. It uses 256-bit incryption and claims to be secure. It will also generate random sequences for passwords, if you want it to, which presumably are "better" because a random sequence cannot be guessed by someone who knows your sister's birthday, or whatever too many people use. You can have a unique password for every site, without the need to remember random sequences.

    They say it's safe.

    In another news item, the fellow who owns the email service that was used by whistleblower Snowden has closed down the service rather than give the government the encryption keys to his service, which they were demanding. Apparently, his system encrypts email, so even though the government could listen in, without the keys they would have only gibberish. With the keys, the government could read EVERYBODY's email, and could ALSO impersonate any subscriber to the service.

    Putting these two news items together, my question is this: With iCloud Keychain, would the security of a user's passwords depend on the security of the cloud server holding the passwords? If the government were to subpoena the encryption keys, or if a hacker were to hack into the server and steal the encryption keys, would they have access to your passwords? Or does the encryption depend on your own computer so that even total access to the cloud server would not give access to your passwords?

    And a separate issue: What if someone had access to your computer, or hacked into it? Would they then have access to all the passwords in your iCloud Keychain? Of course, if someone hacked your computer, they could probably install a keystroke logger and steal your passwords, so maybe this is a moot point.

    I don't use any programs to remember my passwords. I have passwords that I feel are complex enough that nobody is going to guess them and I type them in by hand every time. They are not stored anywhere other than whatever sites do so they can recognize me.

    Bottom line: Would I be more secure with much more complex passwords, stored in the iCloud Keychain, or with passwords that are complex but less so, which are stored only in my head?
     
  2. JMD

    JMD 2012 Prius 4 Solar Roof

    Joined:
    Oct 11, 2012
    3,779
    1,282
    0
    Vehicle:
    2012 Prius
    Model:
    Four
    This is my opinion. Just as a programmer can create encryption a programmer can learn to hack it. Cyber crime is on the rise and it comes from organized criminals, governments, corporate espionage etc.

    With the advent of the Internet and open ports Botnets come in open ports scan your computer for Data and call home and transfer data.

    I tend to keep any important financial data off my computer cause being a IT guy I know bad things can happen.

    If your using tools from large companies you are getter off than no tools but nothing is iron clad secure. If they want you they will get your data.

    The Americans and Israelis have taken security to a different level. If you every talk to a military guy the VPN secure networks the military uses during wartime and peace is very secure but evidently it will never reach the commercial market.

    I once participated in a data analysis for a corporate network and showed that a fortune 100 IP address was communication with another computer in a ITAR country. The CIO researched the internal IO address and it was the CEO. Evidently his computer was hacked but the Cisco firewall prevented the data from leaving the corporate network. They re imaged his computer.

    The research showed his Pac was compromised for many weeks and he never knew as this foreign government tried to steal data and escape the network from an open port.

    Encryption is good but a great firewall and a signature based anti virus like symantic can help the basic home user
     
  3. JMD

    JMD 2012 Prius 4 Solar Roof

    Joined:
    Oct 11, 2012
    3,779
    1,282
    0
    Vehicle:
    2012 Prius
    Model:
    Four
    I read that iCloud Keychain is being pulled from the iPhone iPad OS7 as it is not ready for prime time. May be different on the PC but don't know for sure
     
  4. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    When you say you keep important financial data off your computer, does that mean you do not use the computer for banking? Or just that you don't use programs that know your banking information?

    I was really wondering whether a system like iCloud Keychain (or other cloud-based or computer-based password-remembering systems) are more or less secure than just remembering your passwords. In the one case, you can have much more complex passwords, while in the other case your passwords are less complex but exist only in your own mind.

    P.S. It might be all a moot point for me, because it would depend on getting a new computer. But when Mavericks comes out I might have a look at the latest Macs and consider it.
     
    JMD likes this.
  5. zhenya

    zhenya Active Member

    Joined:
    Sep 6, 2013
    649
    209
    0
    Location:
    Ithaca, NY
    Vehicle:
    2013 Prius Plug-in
    Model:
    Plug-in Base

    The short answer is that we can have an assumption that it will be reasonably secure. The long answer is a bit more complex than that.

    I am no cryptographic expert, but this is how I understand it.

    Lavabit shut down not because he had crytographic keys that could directly decrypt the users email. In fact one of the cornerstones of Lavabit's and most other security is that there are no such keys that can decrypt the data without the user password that acts as the master key to the data. Store your data in the cloud encrypted and forget the password? The provider can't help you - that data is permanently locked up tight.

    Lavabit was shut down because the owner was worried that he could be forced, under court order, to modify the source code in a way that could capture the plain-text password as the user entered it (in other words, a key logger) or to give up the keys to the SSL connection that secured the transmission of that password between the users computer and the Lavabit servers, and the NSA could spy on that communication and capture the password during transit. So theoretically such a thing could happen with Apple or any other cloud provider as well, but it is unlikely for an average user.

    There are plenty of programs that manage passwords though that are safe. I use Password Safe which is open-source and the user chooses where to store the vault. I happen to store mine on Dropbox, which allows me to synchronize my vault between devices, but you don't have to. If it is stored locally on your computer, the master password is never transmitted anywhere, and short of your local computer being compromised, in which case all bets are off on security, nobody can get access to your vault.

    I feel like I had reasonably good password security before, and probably had somewhere on the order of a dozen reasonably complex passwords memorized. The reality was though that even a dozen passwords doesn't get me far today - I probably need passwords for 50-100 different places. As a result I had lots of duplicates. I spent a lot of time trying to remember which password I'd used for which site - especially the less common ones, and it meant a lot of wasted time and less security.

    Password Safe allows me to remember one extremely complex password, that I can deal with changing on a somewhat regular basis, and allows me to have unique complex passwords for every place I need one. I open the safe, see my username, double click which temporarily copies the password into the clipboard, and paste it into the field I need it in. It is a godsend.
     
  6. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    ^ Thanks for that information. The owner of Lavabit, in the interview, mentioned SSL keys. So the government was after those keys so they could tap the lines and decrypt the passwords. That makes sense, because he mentioned it would give the government the ability, not only to read all the emails, but to impersonate the user.

    Presumably more mainstream providers have already given the government this information.

    This also means that no matter whether you remember your passwords or use Password Safe or iCloud Keychain, someone who had those SSL keys and the ability to tap the communication, could get your passwords.

    So the only threats you can defend yourself from are hackers who do not have those SSL keys, and who need to trick you into giving up your passwords, or hack your computer to log your keystrokes. Or guess your passwords, which I gather is easier than it should be for many folks, whose passwords are their dog's name. I knew someone who did that. She was smart enough to know it was not secure, but she didn't care. Hopefully, she was more careful with banking sites.

    The owner of Lavabit said in the interview he'd have gladly given the government the ability to hack Snowden's account, but they were demanding all the keys, which would have allowed them to hack all his users' accounts. He was asked if he had considered taking his business overseas, and he said that he's not given up on the US and does not want to leave the country, but that he'd probably give the business to someone overseas to operate it, and do something different himself.
     
  7. zhenya

    zhenya Active Member

    Joined:
    Sep 6, 2013
    649
    209
    0
    Location:
    Ithaca, NY
    Vehicle:
    2013 Prius Plug-in
    Model:
    Plug-in Base
    The distinction, which I think you understand, but I'm just making sure, is that if someone is able to 'tap' the line via access to the SSL key, then yes, they can capture that info that you are currently transmitting. If that's the key to your icloud keychain, then yes, you'd be entirely compromised. With PW Safe the master password is never transmitted, even if you store the encrypted vault in the cloud. When you go to use the contents of that vault, that specific data may be transmitted, but that's just part of using the modern Internet.
     
  8. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    Yes, I understand. But if someone has the SSL key you are using to send your password to the web site, and the ability to intercept the transmission, then they can decode the password as you are sending it. They do not have access to your computer or your Password Safe, but they now have your password for that one web site, and they can log on as you.

    My understanding, which may not be correct, but I think it is:

    You want to log onto your account at State Bank of East Dakota (SBED). You go to the web site and get a log-in page. SBED generates a very big number which is the product of two prime numbers. SBED knows the two primes, and only sends you the product of them. You type your password into the web page, or you paste it in from your PWSafe, doesn't matter. Your computer uses the Big Number to encrypt the password, and sends the encrypted password back to SBED. It is not possible within any normal time span, using the most powerful computers available today, to decrypt the password from the Big Number. You need the two primes that made it. And it is not possible to factor the Big Number in a reasonable time frame with computers available today. If you have the two primes you can decrypt it easily. SBED has those primes because it created the Big Number in the first place, so it decrypts the password, and having verified that it's really you, allows you to do your banking. Presumably there's another level of encryption and the passwords are stored encrypted so the night janitor at SBED cannot peek at the list and steal everyone's money.

    But now the government decides it wants access to your account, or the Russian Mafia wants your money. They obtain the SSL keys (using a subpoena or by threatening the bank manager's family) and then they intercept the encrypted transmission, use the previously-obtained SSL key (the two prime numbers, I suppose) to decrypt it, and later, after you've logged off, they log into your account.

    Nobody's going to come after me. I'm not rich enough to justify the bother for theft, and I'm of no political significance, to be of interest to the government. But when they go after political dissidents they deprive us all of the freedom to hear the full range of political ideas, and when they go after whistle-blowers they deprive us all of the ability to learn of the dirty dealings of the politicians we elected. In the name of "national security," politicians protect themselves from scrutiny for their own crimes.

    I think my original question was answered: It really doesn't matter how I store my passwords. But the bigger issue remains, of politicians, in the name of government, using these tactics to get at the people who would expose them as crooks. Of course, politicians have always used whatever means they had available to get at their political opponents, and always in the name of national interest.
     
  9. JMD

    JMD 2012 Prius 4 Solar Roof

    Joined:
    Oct 11, 2012
    3,779
    1,282
    0
    Vehicle:
    2012 Prius
    Model:
    Four
    Remember your passwords in your brain. Have a paper copy locked in a safe in your home

    I use b of a online banking for many years never a problem and they are insured against theft

    I like to use quicken and pull data from banks and brokerage accounts but I type in passwords when I update. I don 't store my account info in the cloud with quicken.
     
  10. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    Sorry, I cannot grasp the grammar of that. Typo?
     
  11. zhenya

    zhenya Active Member

    Joined:
    Sep 6, 2013
    649
    209
    0
    Location:
    Ithaca, NY
    Vehicle:
    2013 Prius Plug-in
    Model:
    Plug-in Base
    Yep, I think you've got it Daniel.

    Well designed sites won't store the user passwords in any way on their servers. The only way for someone to get it outside of your computer is to get those SSL keys and eavesdrop. This generally requires cooperation from the website though. If it didn't, Snowden's Lavabit email would have been compromised. This tells us that the NSA has likely not yet broken SSL encryption.

    It's not practical for the vast majority of people to remember the number of passwords we need these days, especially with any level of complexity. Digital vaults like above will typically give most users an overall better level of security than trying to remember a few different passwords - and this way the key is never recorded anywhere but in your brain.
     
  12. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    Then how do they know if the password you entered is valid?
     
  13. JMD

    JMD 2012 Prius 4 Solar Roof

    Joined:
    Oct 11, 2012
    3,779
    1,282
    0
    Vehicle:
    2012 Prius
    Model:
    Four
    I have Symantic for virus protection and they offer password vaults. I'm suspicious of these services
     
  14. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    I had Symantic. When the Symantic anti-virus suite started using more of my computer's resources than my applications, and accessing my hard drive more or less non-stop, that was when I decided it was time to switch away from Windows. I tried Linux, but Linux was not yet ready for a non-tech user, so I switched to Mac.

    I have considered using a password program, but it occurred to me that if that program were to malfunction, I'd be unable to access any of my accounts. I'm going to keep doing it the way I do now. I'm confident that nobody's going to guess my passwords, and I don't have that many sites that need secure passwords. For sites like this, nobody's likely to spend much effort trying, because there's no payoff in hacking my Prius Chat account. And having to copy and paste passwords every time I log into my bank is a lot more work than typing a password that I remember. My passwords are less secure than a 25-character random string, but nobody is going to guess them because I have not tied them to anything personal.

    Bottom line, it's like the locks on your house. No lock will keep out a sufficiently determined burglar. The door lock only has to be good enough that it would be easier to smash their way in. Passwords only have to be good enough that it would be easier for them to hack their way in without it. Nobody will guess my passwords, so anybody that wants into my accounts would have to do it some other way. I'm not the weak spot, and I have no control over any other part of the system.

    Oh, and all those movies where they attach a gadget that runs a million passwords a second until it hits the right one? Web sites that need serious security only allow three wrong tries before they lock you out. It ghasts my flabber that people accept those movies where the genius hacker can get into any system by guessing the password. I think real hacking is mostly exploiting flaws in an operating system, or social engineering, getting people to agree to install a malicious program or to reveal their password. It doesn't matter how good your password is if you're going to type it into a spoofed web site that you opened from a link in a spam email, or if they've used a zero-day exploit to plant a spy program on your computer.
     
  15. Mendel Leisk

    Mendel Leisk Senior Member

    Joined:
    Oct 17, 2010
    56,168
    38,992
    80
    Location:
    Greater Vancouver, British Columbia, Canada
    Vehicle:
    2010 Prius
    Model:
    Touring
    When Adobe was recently hacked they apparently had user's passwords stored on the site. I'm a customer of theirs, and an email I got from them post-hack was in part to reset my password.

    Some years back I recall asking (via email) a question at one web site, something regarding my user profile. In their response was included my username and password...
     
  16. JMD

    JMD 2012 Prius 4 Solar Roof

    Joined:
    Oct 11, 2012
    3,779
    1,282
    0
    Vehicle:
    2012 Prius
    Model:
    Four
    I would imagine that biometric passwords that the new iPhone provides will start to be common.
     
  17. JMD

    JMD 2012 Prius 4 Solar Roof

    Joined:
    Oct 11, 2012
    3,779
    1,282
    0
    Vehicle:
    2012 Prius
    Model:
    Four
    Part of the problem with the Internet is DNS hijacking
     
  18. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    I'm not sure I entirely trust those either. All it would take is a bug in the program, or an injury to your finger, and you'd be locked out. Say, you burn your finger on the stove and have to wear a bandage. Bye-bye to all your web accounts. I'd be more inclined to trust a dongle, though they'd have to install a suitable plug in all mobile devices for it.

    Then there's this: No matter what the security measure, it's transmitted digitally from your device to the web site. All the hacker has to do is intercept the transmitted signal, and perhaps decode it. Since they'll never guess a reasonably complex password, what have you really gained with a hardware or biometric passkey? The solution for the hacker is the same: Intercept and decode, or slip in a backdoor.

    The biometric passkey relieves the user of the need to remember a password, but it leaves you with a single passkey for every site. Once the hacker intercepts and decodes that, he has access to all your accounts. With the old (present) way, at least he has to intercept and decode a separate password for every site.

    I think they'd accomplish more if they made the internet more secure. Make it impossible to spoof the From line, so you'd know that email was not from your bank. Make the DNS impossible to hijack. (I have only a vague idea what the DNS is: When you type a site name into the URL line, the browser looks up an IP address, so a hacker who hacks the DNS server can substitute the IP address of a spoofed web site, to grab your password as you type it in? In that case, it does not matter how secure your password is.)

    One pet peeve of mine is sites that force you to change your password regularly. I do not believe that accomplishes anything except to make it harder to remember your password, so that you have to write it down. Similarly for sites that require you to include two caps, two lc, two numerals, and two punctuation marks in your password. Then it's IMPOSSIBLE to remember and you HAVE to write it down. I have moved my money out of a bank when they made their password rules too onerous.
     
  19. zhenya

    zhenya Active Member

    Joined:
    Sep 6, 2013
    649
    209
    0
    Location:
    Ithaca, NY
    Vehicle:
    2013 Prius Plug-in
    Model:
    Plug-in Base
    Sorry, I miss-spoke. I meant stored in plaintext or in any form that they can help retrieve it other than re-setting it.

    Apple's biometric password, like every other consumer one I'm aware of, is only a convenient alternative to entering a password. You always have the option of entering the password as an alternative. As of this point, Apple's is only good for getting into the phone, and for limited purchases through the App Store. It's really just about making having a pass code with immediate lock on your phone more convenient, and for that, it's fantastic. If it is extended to other methods, it will likely be only to decrypt a local safe on the device, which would then send the appropriate credentials for that site. The fingerprint data would not be transmitted.

    Rules for password complexity and frequency of changing them are superb ways of greatly increasing the effectiveness of password security. They are onerous for the user, but do make a big difference. I've certainly been frustrated by the same rules, but they make a big difference. Password managers will typically let you customize the rules for password generation to each sites specific policy. Like you, I used to keep the same passwords memorized for a long time. It has been a big relief not having to worry about them anymore.

    Man in the middle attacks will always be difficult to protect against. That's why the security of SSL is so essential. You are right about the basic problems of the Internet for security, and many folks have been banging that drum for years. Unfortunately it's such a big job to change it, and would be so massively disruptive that we are unlikely to see any fundamental changes for a long time yet.
     
  20. daniel

    daniel Cat Lovers Against the Bomb

    Joined:
    Feb 25, 2004
    14,487
    1,518
    0
    Location:
    Spokane, WA
    Vehicle:
    2004 Prius
    ^ Thanks for that info.

    But how does it improve security to make me change a password that nobody has guessed yet? I can memorize a relatively difficult password if I don't have to learn a new one every month or two. When they require frequent changes (to a password that has NOT been breached) they force me to use simpler passwords so I'll be able to memorize them more often.