Upgrading to Thunderbird 60.x from a berkeley DB based Profile to a sqlite one causes key data loss
Categories
(Thunderbird :: Security, defect)
Tracking
(Not tracked)
People
(Reporter: b.neuburger, Unassigned)
References
Details
(Keywords: regression)
Updated•6 years ago
|
Updated•6 years ago
|
Comment 1•6 years ago
|
||
Comment 2•6 years ago
|
||
Reporter | ||
Comment 3•6 years ago
|
||
Updated•6 years ago
|
Comment 4•6 years ago
|
||
Comment 5•6 years ago
|
||
Comment 6•6 years ago
|
||
Updated•6 years ago
|
Comment 7•6 years ago
|
||
Comment 8•6 years ago
|
||
Comment 9•6 years ago
|
||
Comment 10•6 years ago
|
||
Comment 11•6 years ago
|
||
Comment 12•6 years ago
|
||
Comment 13•6 years ago
|
||
Comment 14•6 years ago
|
||
Comment 15•6 years ago
|
||
Comment 16•6 years ago
|
||
Comment 17•6 years ago
|
||
Comment 18•6 years ago
|
||
Comment 19•6 years ago
|
||
Comment 20•6 years ago
|
||
Comment 22•5 years ago
|
||
(In reply to Wayne Mery (:wsmwk) from comment #10)
The caveat is, does backing this out complicate future potential permanent
fixes?
No
Comment 23•5 years ago
|
||
(In reply to Jorg K (GMT+2) from comment #14)
(In reply to Magnus Melin [:mkmelin] from comment #13)
This bug is further evidence the master password is a bad idea.
This old argument again. We should keep it out of here. The master password
is not a bad idea, it's only badly implemented, see bug 524403 and bug
Given that the master password protection is considered easy to break, it's another argument why CVE-2018-12383 isn't that dramatic for us.
On one hand we should push to get some improvements in bug 524403, because we might want to protect additional secrets with the master password in the future.
On the other hand, the master password only protects against casual attackers, who can easily copy files from the victim's disk - or against bugs, which allow a remote attacker to exploit a limited bug that can be used to steal files from disk, but not install backdoor software.
It cannot help against an advanced attacker, who uses the opportunity to access the victim's computer to install a backdoor and keystroke recorders, which can then be used to defeat any level of encryption we could use with the master password.
In other words, the master password feature is nice to have for people casually accessing your computer, but cannot be a real protection, even if we improve it. To protect against that, you need to use full disk encryption, always lock your display when you're away etc.
Comment 24•5 years ago
|
||
We didn't record the answer to comment 16 and 17, but comment 18 shows that I had communicated with Jörg outside bugzilla to provide the required information. Yes, if the old key3.db isn't deleted, then we will continue to attempt the migration at the next time the information is required.
(In reply to Wayne Mery (:wsmwk) from comment #21)
This seems to have stalled. How do we move forward?
We have fixed the issue for 60.x, accepting that the CVE remains unfixed.
I suggest to close this bug.
If we assume that some users are still on TB 52.x and might migrate at a later time (realistic, given TB 52.x supported add-ons), we need to continue protect users against this problem.
I suggest we again back this out on the TB 68.x branch. I'll file a new bug to track that.
We haven't yet worked on a safer solution for NSS and Firefox yet. Firefox still has the code to delete key3.db.
Comment 25•5 years ago
|
||
On the other hand, the master password only protects against casual attackers, who can easily copy files from the victim's disk - or against bugs, which allow a remote attacker to exploit a limited bug that can be used to steal files from disk, but not install backdoor software.
There's another scenario that I didn't think of earlier: If the user stores backups to shared computers, not encrypting the backup files, it's much easier for an attacker to get access. With many users using cloud services, maybe that's a frequent scenario. Having a master password set could provide some protection against brute-forcing the backup files, if the master password protection is strong.
Comment 26•5 years ago
|
||
(In reply to Kai Engert (:kaie:) from comment #24)
We have fixed the issue for 60.x, accepting that the CVE remains unfixed.
I suggest to close this bug.
closing
I suggest we again back this out on the TB 68.x branch. I'll file a new bug to track that.
Updated•5 years ago
|
Comment 28•5 years ago
•
|
||
As already explained, this issue was initially triggered by the fix for bug 1475775 (CVE-2018-12383), which we had backed out for Thunderbird.
We now have a better fix for Thunderbird, that we intend to ship in the next Thunderbird 68.x update, in a way that should avoid this dataloss. That new fix is tracked in bug 1606619.
Description
•