Summary: | MissionControl deliver clear text password through Account.Parameters | ||
---|---|---|---|
Product: | Telepathy | Reporter: | Nicolas Dufresne <nicolas> |
Component: | mission-control | Assignee: | Telepathy bugs list <telepathy-bugs> |
Status: | RESOLVED NOTABUG | QA Contact: | Telepathy bugs list <telepathy-bugs> |
Severity: | major | ||
Priority: | medium | ||
Version: | git master | ||
Hardware: | All | ||
OS: | All | ||
Whiteboard: | |||
i915 platform: | i915 features: |
Description
Nicolas Dufresne
2010-01-28 16:26:52 UTC
As we discussed on IRC, this isn't a “severe security issue” on any normal system: • if an application can access the session bus; • then it is running as the same user as the keyring; • so it can ptrace the keyring or the connection manager and find out your password anyway. The spec. work being done to allow non-CM processes to respond to authentication challenges will allow the password not to be passed around like this, and even not to be stored (instead requiring the user to type it in at login), as side-effects of being able to use Kerberos etc. You are mixing thread here. We spoke on IRC about real-time sniffing of communication between MC and CMs at login and Client and MC on account management. While this should (I hope) be protected it's not the subject of this bug. The BUG is there because the TP spec for account bypass the keyring. MC obtain right to read password in the keyring and allow (without user being informed) all other processes to obtain them. The goal of the keyring is to make sure that a process won't have access to a password without user authorization. The TP Spec for account is in complete opposite of this and thus TP Spec is security broken, no matter what opinion you have on security. This bug may not be fixed in short term, but an archive of it is really important. It's a matter of month before respectable distros like RedHat or Suse reject our software because of that. (In reply to comment #2) > The BUG is there because the TP spec for account bypass the keyring. MC obtain > right to read password in the keyring and allow (without user being informed) > all other processes to obtain them. If a process can access the bus, then the process can do whatever the keyring does to read your passwords from disk, because it is running as your user. It's the same non-issue. > This bug may not be fixed in short term, but an archive of it is really > important. It's a matter of month before respectable distros like RedHat or > Suse reject our software because of that. Oh, right, just like "respectable distros" rejected Pidgin for storing your passwords in plain text for the last ten years. |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.