top | item 20460325

Firefox to Warn When Saved Logins Are Found in Data Breaches

312 points| rahuldottech | 6 years ago |bleepingcomputer.com

111 comments

order
[+] daveguy|6 years ago|reply
Firefox is using the wonderful haveibeenpwned resource. There is also a public API for haveibeenpwned if you want to incorporate it into your own clients:

https://haveibeenpwned.com/API/v2

Please note rate limits/ abuse policy so everyone can use:

https://haveibeenpwned.com/API/v2#RateLimiting

(I am not affiliated)

[+] Deimorz|6 years ago|reply
Probably worth noting that Have I Been Pwned is now up for sale: https://www.troyhunt.com/project-svalbard-the-future-of-have...

I've always been a huge fan of the project (and Troy) and understand that it's gotten to a point where he can't keep running it as a spare-time project, but I'm still not very happy about seeing it being shopped around. I can't see how this type of service needing to find a way to become a business will be a good thing overall, especially when it keeps getting integrated into other programs and services like this. Troy pledges that nothing will change, but every company getting acquired does that, and then things change anyway.

The best result would probably be something like Mozilla buying it and/or paying Troy to just keep doing what he's doing.

[+] cablej|6 years ago|reply
There are fundamental privacy risks to using the HIBP Pwned Passwords service which should be considered when implementing it. See my writeup here — https://cablej.io/blog/k-anonymity/. In short, despite claims of protecting privacy, a malicious server can recover user passwords in some cases even if they haven’t previously been compromised.
[+] euroclydon|6 years ago|reply
One thing HIBP does is match a password against a list of half a billion leaked passwords without regard for the username portion of the credentials. They do it because of the NIST guidance to compare credentials to known data leaks. The same NIST who's previous guidance was a complicated password entropy algorithm, which they later dropped.

I've always questioned the logic making 500,000,000 passwords off limits when no connection is made to the username. Work-factor hashing algorithms, rate limiting account locking and 2FA are supposed to protect user from brute force attacks. I think they can handle an attack based on 500 million possibilities.

Now, if they matched the username/password pair, that would be great.

[+] AznHisoka|6 years ago|reply
OK, enough is enough. I'm switching to Firefox now.

Protip to Firefox: Advertise this feature more. The other stuff I don't really care about, and didn't really convinced me to move to Firefox. Fear is an excellent motivator, however.

[+] mevile|6 years ago|reply
Try and give Firefox Containers a test too. It's a Firefox extension made by Mozilla that creates separate environments where cookies and session data are not shared. It's a great feature I never want to do without. I use it to create a wall between work and personal web browsing.
[+] numbers|6 years ago|reply
You will be happy with the move, if you're coming from Chrome, most extensions/add-ons are available on Firefox so the transition was not tough for me. There are some things like getting used to the dev tools but that shouldn't be too bad :)
[+] Ayesh|6 years ago|reply
For non-tech users, privacy isn't a very good selling point.

Both my parents use Chrome because it's already installed on Android and works fine. My attempts to convince them to Firefox didn't work out even with multiple attempts.

[+] user17843|6 years ago|reply
The functionality is part of every decent password manager, which takes care of basically all your passwords, not the ones stored in your browser. So I don't understand the enthusiasm.
[+] okasaki|6 years ago|reply
What data does this send and who receives it?

Is money involved in this partnership? If so, who paid whom?

What was the motivation behind this? Is there any study that shows any benefit from haveibeenpwned.com? I.e. has there been a decrease in hijacked accounts, etc?

[+] Deimorz|6 years ago|reply
CCP Games integrated it into Eve Online and says that it significantly reduced the number of players using insecure passwords:

> When we first implemented the check, about 19% of logins were greeted with the message that their password was not safe enough. Today, this has dropped down to around 11-12% and hopefully will continue to go down.

From https://www.eveonline.com/article/pu2gdi/account-security-im...

[+] Vinnl|6 years ago|reply
That sounds like a good reason to get your non-technical friends and relatives on Firefox.

(Edit: though I wonder whether the really non-technical ones will not interpret this as having to change the displayed saved password, rather than having to visit the website.)

[+] mwilliaams|6 years ago|reply
How does Firefox compare your actual password to the leaked password without storing your passwords in plaintext?
[+] feanaro|6 years ago|reply
It is storing your passwords in plaintext locally, since this is about passwords that are saved by the user in Firefox's password store (the Saved Logins feature). These can (and should) be protected with a master password, but you obviously need to unlock the store before logging into a website.

They're not storing your passwords remotely, though. They're asking haveibeenpwned which maintains a list of leaked login information from past breaches.

[+] SAI_Peregrinus|6 years ago|reply
Firefox has a built-in password manager, so plaintext passwords are necessarily stored in that database. The backend comparison service they're using supports a near-zero-knowledge protocol that allows clients to check for compromised passwords in the database efficiently without ever sending the password (or even a hash of the password) to the backend.

Also they can just query all the usernames (email addresses) of the accounts and get notifications if any of those usernames have appeared in breaches.

[+] qzw|6 years ago|reply
That’s a nice feature, and I hope other browsers will adopt something similar soon. Also looking forward to the password generator that’s finally coming in Firefox 69. On a slight tangent, I wish the major browsers would agree on an interoperability standard for their built-in password managers.
[+] r00fus|6 years ago|reply
> On a slight tangent, I wish the major browsers would agree on an interoperability standard for their built-in password managers.

Are you talking about an interop standard for storing/sharing passwords, or for generating them?

Because the latter is hobbled significantly by a twisting maze of password requirements and login form implementations by sites (banks, webmail, etc).

[+] mnoorenberghe|6 years ago|reply
Press reports that this is shipping in Fx69 were incorrect.
[+] bovermyer|6 years ago|reply
Is Firefox trying to replicate all behavior of password managers?
[+] Groxx|6 years ago|reply
Browsers that offer to save your passwords are password managers. They've just been downright abhorrent at it for years. Improving that seems worth doing?
[+] hartator|6 years ago|reply
How sending clear login and passwords to a third party website is ever a good idea?
[+] hughes|6 years ago|reply
It isn't doing this. It uses rough hash of the password to generate a bucket ID that could represent a large number of passwords. That information is the used to query a bucket for whether any passwords in the bucket exist.

For example, "password" hashes to "5DAA6", and the resulting bucket[1] lists secure hashes of several dozen passwords.

The client then generates another hash of the password (eg. "1E4C9B93F3F0682250B6CF8331B7EE68FD8"), and checks if that secure hash is in the bucket (it is, "password" has been compromised at least 3,730,471 known times).

[1]: https://api.pwnedpasswords.com/range/5BAA6

[+] java-man|6 years ago|reply
Does it mean your browser is going to leak your sites/account information to a third party?

Will this feature be enabled by default?

Can this be disabled?

[+] jsgo|6 years ago|reply
HIBP doesn't work that way really. You don't query for a site breach + email combination, you basically give your email address and then it returns back a list of breaches your email address was part of.

As far as HIBP linking your email to specific breaches, well, it is essentially using public data sets so that disclosure exists already (before HIBP even enters the picture). They are a bit more reserved with certain cases (the Ashley Madison breach for example), but even then if someone wanted to locate email addresses in that breach, they'd just go get that data set.

[+] MrStonedOne|6 years ago|reply
They don't look at passwords

They look at breached sites and rather or not you saved a login for that site on a date before the site was breached.

[+] verisimilitudes|6 years ago|reply
So, Firefox operates with yet another third party. I've never used this ''Have I been PWNed?'' drivel and don't intend to start, but I don't usually find myself using a Firefox-brand Firefox, either.

What's so compelling about this website? To me, this looks like yet another silly idea people coalesce around and find important. In having a discussion about this, someone mentioned how it's not that different from Facebook and Cloudflare in managing something technical for those who don't care to, and I find this a rather decent comparison. This is yet another centralized and completely unnecessary entity.

I don't see the appeal and I don't like what I regard as a stupid idea receiving so much attention from so many groups. This isn't surprising coming from Troy Hunt, however, who I best remember as the person bitching about an ad blocker blocking an ad he found acceptable.

[+] jedimastert|6 years ago|reply
Do you maybe want to explain why you think it's a bad idea instead of spending three paragraphs dumping on it?
[+] Endy|6 years ago|reply
So you're saying that the browser client will now be regularly sending secure information on a regular basis to a predictable IP, across HTTP (hopefully S, but I'm sure there will be a fallback), via dynamic path and across an unknown number of hops for transit. And this is supposed to be more secure.

I'm sure there's nothing to go wrong with that wonderful plan! Taking control away from the user is a great idea!

Except that it's not.