Hi,

any LibreWolf experts here, that know how this Wolf handles saved password / auto-login? It’s the only browser, that I’m aware of that shoots saved credentials directly into the login forms without any further clicks. You just have to click “login” and you are ready to go.

Unfortunately here on my workplace I’m forced to use Chrome and I have to login on many different site through the day. Mostly 3 to 4 clicks every time:

Activate login form - click Open saved credentials context menu - click Choose desired creds from list - click Login - click

Even the global password manager Keeper is not very helpful on websites. Even more interactions are neccessary for logins.

Firefox is also installed, so I thought someone can recommend an addon or userscript, whereby I’m cautious with third party addons that are handling credentials. On the other site there is Google password manager in Chrome…

Any hints?

Thanks!

  • @rakerOP
    link
    English
    17 months ago

    Exceptionally I’m looking for the fastest solution not the safest one without violating company security policies. I personally use KeePass, too. I’ll check out those extensions, thanks! One question: Browsers do not store credentials encrypted? Or too weak encrypted?

    • sylver_dragon
      link
      English
      37 months ago

      They are encrypted and the encryption is just fine. The problem is that the key is stored locally on your system and can be used to decrypt them automatically. And crucially, that key is not encrypted, it’s just encoded in a well known format (base64). This means that it’s trivial for an attacker’s script to retrieve them, use that key to decrypt them and send them up to the attacker’s Command and Control (C2) server. As an analogy, imagine having the world’s best lock on your front door, but you have the key under your door mat. The lock counts for fuck all, because any thief who isn’t a complete moron will look under the mat.

      You can actually see this in action for yourself, without your passwords being sent to an attacker. NirSoft has a tool called ChromePass which will retrieve and display passwords saved in Chrome. If I run this on my own system, I get something like:

      And this works whether or not the browser is running. So, if you get phished, or get hit by an unpatched vulnerability, any password you have saved in your browser is now in the hands of an attacker. And this happens in the first few seconds of an infection. It only takes one mistake and they are gone. And, while we all like to think that we are immune to phishing or mistakes like that, we all fuck up. It happens. This is why we plan for “defense in depth”. Keeping your passwords out of a browser means that, when you make that mistake, they don’t end up in the hands of attackers.

      • @rakerOP
        link
        English
        17 months ago

        base64

        Wow! That’s not even encrypted O_0 Does every browser just “encode” password lists like that?

        Bth NirSoft tools are just great. Lost passwords and many other things. Anyway, thanks for the infos!

        • sylver_dragon
          link
          English
          2
          edit-2
          7 months ago

          Does every browser just “encode” password lists like that?

          It’s the decryption key for the encrypted passwords which is encoded (I know confusing). But, they may as well not be encrypted for all the good it’s doing you.

          Off the top of my head, Chrome does this. MS Edge, which is Chrome with a blue coat of paint, does. Opera is Chrome with red paint, so it’s almost certainly base64 as well. Brave browser is Chrome with orange paint… You get the idea, lots and lots of “independent” browsers are just Chrome (ok technically, Chromium, the open source version of Chrome) which mean they inherit all it’s faults. I don’t know the scheme Firefox uses, but it’s similar enough that recovering passwords is equally as trivial. Here is the tool for that.

          The long and short of it is that any system for storing passwords which doesn’t have you using some sort of “master password” to unlock the vault, is storing the password locally in a way which is going to be well known and easy for an attacker to reverse. Technically, hardware solutions like smartcards and YubiKeys can also be used in place of passwords; but, that’s a whole different area of discussion. Sadly, when things are really convenient, they are usually also really insecure.

          • @rakerOP
            link
            English
            17 months ago

            Thanks again for all the insights!