Security issue : You should Provide password to open the cookies.sqlite file.
Categories
(Core :: Networking: Cookies, enhancement, P5)
Tracking
()
People
(Reporter: muthukumar13402040, Unassigned)
Details
(Keywords: reporter-external, Whiteboard: [necko-would-take])
Comment 1•9 years ago
|
||
Updated•9 years ago
|
Updated•9 years ago
|
Comment 2•8 years ago
|
||
Comment 4•5 years ago
|
||
I could be sold either way. I don't know what kind of password we could use that would be known to Firefox but not known to a malicious program running under the user's account as described. Not everyone has a master password or sync password. If we build it into Firefox then everyone could get the One True Password by looking in the source code or binary. If we use the OS store then every program running by that authorized user will be able to get it. At least other users of a shared computer couldn't, but proper directory permissions on the profile file ensures that as well.
So, yeah, it's unlikely we'll be able to do anything about this.
Updated•5 years ago
|
Any news of this issue ?
I get it that cookies are not in your threat model, but them why encrypt the passwords with the Primary Password them ? It only creates a false feeling of security with the user thinking that all of their credentials are protected when they enable it.
As I said in #1743810:
Storing unencrypted cookies can be dangerous as much as storing unencrypted passwords, it doesn't matter if the cookies are supposed to be used like that or not, the fact is that a huge amount of websites won't check anything beyond the cookies to do the authentication. Chromium already does it since a long time.
Firefox could use the primary password that already encrypts the stored passwords and extend it to encrypt the cookie database too.
Updated•10 months ago
|
Description
•