Security of Password Managers

Schneier on Security 2014-09-05

At USENIX Security this year there were two papers studying the security of password managers:

It's interesting work, especially because it looks at security problems in something that is supposed to improve security.

I've long recommended a password manager to solve the very real problem that any password that can be easily remembered is vulnerable to a dictionary attack. The world got a visceral reminder of this earlier this week, when hackers posted iCloud photos from celebrity accounts. The attack didn't exploit a flaw in iCloud; the attack exploited weak passwords.

Security is often a trade-off with convenience, and most password managers automatically fill in passwords on browser pages. This turns out to be a difficult thing to do securely, and opens up the password managers to attack.

My own password manager, PasswordSafe, wasn't mentioned in either of these papers. I specifically designed it not to automatically fill. I specifically designed it to be stand alone. The fast way to transfer a password from PasswordSafe to a browser page is using the operating system's cut and paste commands.

I still recommend using a password manager, simply because it allows you to choose longer and stronger passwords. And for the few passwords you should remember, my scheme for generating them is here.