Closed Bug 397122 Opened 17 years ago Closed 17 years ago

NSS 3.12 alpha treats a key3.db with no global salt as having no password

Categories

(NSS :: Libraries, defect, P1)

x86
Windows XP
defect

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: Dolske, Assigned: nelson)

Details

(Keywords: regression)

Attachments

(3 files)

Attached file Testcase: key3.db
[Spinoff from bug 393835, which was getting long and messy.]

Reporter filed a bug regarding a loss of stored passwords after switching from Firefox 2 to a Filefix 3 alpha (trunk). We were able to recreate the problem using the reporter's key3.db (on XP and OS X).

If I enable password manager debugging, I see this logged to the console when it's invoked:

PwMgr Storage: Initializing key3.db with default blank password.

This is generated in http://mxr.mozilla.org/seamonkey/source/toolkit/components/passwordmgr/src/storage-Legacy.js:

 132         // Check to see if the internal PKCS#11 token has been initialized.
 133         // If not, set a blank password.
 134         var tokenDB = Cc["@mozilla.org/security/pk11tokendb;1"]
 135                             .getService(Ci.nsIPK11TokenDB);
 136 
 137         var token = tokenDB.getInternalKeyToken();
 138         if (token.needsUserInit) {
 139             this.log("Initializing key3.db with default blank password.");
 140             token.initPassword("");
 141         }

This indicates that |token.needsUserInit| is returning true for some reason. The branch version of this code is identical (although in C++).

[Another issue here is that the .initPassword() call seems to succeed, but it shouldn't because there's already a master password set. I'm hoping that's just a side-effect of whatever is broken.]

To reproduce:
1) Create a new profile with Firefox 2, and quit browser.
2) Copy the attacked key3.db / signons2.txt into the new profile.
3) Start Firefox 2, view all passwords. Enter "TestPwd01" when prompted for the master password. Note that there is 1 login stored (google.com, user = "username", pass = "password").
4) Quit Firefox 2, start Firefox 3.
5) Go to view all passwords... Note that the "Use a Master Password" checkbox is no longer checked, and that no passwords appear to be stored.
6) Enabling the MP as "TestPwd01" doesn't help.

I also tried to recreate to problem *without* using the reporter's key3.db, by starting with a new FF2 profile, doing a variety of things, and then updating to Firefox 3... That always worked. I'm not sure what's special about this supplied key3.db, but if it works fine in FF2 it ought to work fine in FF3.
Flags: blocking1.9?
Attached file Testcase: signons2.txt
This key3.db file is very strange. 
It is only 12KB in length.  
All Key3.db files created since 3.9 (at least) at minimum 16KB in size.  
It IS a version 3 key DB But it has no Key DB Global Salt.  

Because it is so strange, I suspect it was created with a VERY old 
version of NSS.  I wonder if the system on which it was created has some
old OLD NSS shared libraries in the PATH somewhere (LD_LIBRARY_PATH on 
Linux/Unix).

When I put it into a directory with a vanilla empty cert8.db and minimal
secmod.db (no root module), and test it with the command
   certutil -K -d dbdir 
I get different results depending on the version of NSS that I am using.

NSS 3.9.x and 3.11.x prompt for the password and then list the DB contents 
as follows:

Enter Password or Pin for "NSS Certificate DB":
<0> Imported Certificate
<1> Imported Certificate #3
<2> Imported Certificate #2
<3> Root CA ID von CAcert WoT User

NSS 3.12 alpha (trunk) does not prompt for a password, and reports:

certutil: no keys found

I am still debugging this, but this seems very likely related to the 
big DB changes in 3.12, so I am assigning this to Bob.
Assignee: nobody → rrelyea
Keywords: regression
OS: All → Windows XP
Priority: -- → P1
Hardware: All → PC
Summary: Sometimes a key3.db working with FF2 won't work with FF3 → NSS 3.12 alpha sees no keys in key3.db that works OK with 3.11.x
Target Milestone: --- → 3.12
Version: unspecified → trunk
I stepped through the certutil -K command on both 3.11 and the trunk.
Both processes got through NSS initialization without any problem.
Both observed that the version was 3 and there was no global key DB salt.

The first difference that I observed was when certutil's function listKeys
called PK11_Authenticate, which called PK11_DoPassword, which called 
PK11_NeedUserInit.  In 3.12, PK11_NeedUserInit returned PR_TRUE but in 
3.11.x it returned PR_FALSE.

Further investigation shows that when NSC_GetTokenInfo calls 
sftkdb_HasPasswordSet(handle), that function returns SECFailure.

sftkdb_HasPasswordSet(handle) calls lg_GetMetaData (a new function in 3.12)
which calls nsslowkey_GetPWCheckEntry, which returns SECFailure because
there is no key DB global salt.  GetKeyDBGlobalSalt returns NULL.

So, in NSS 3.12 alpha, the absence of of a key DB global salt causes 
NSC_GetTokenInfo to conclude that there is no password set.  It sets
CKF_LOGIN_REQUIRED but not CKF_USER_PIN_INITIALIZED, and that makes 
PK11_NeedUserInit return true.  It's all downhill from there.

Next I will go back and look at the behavior of NSC_GetTokenInfo in 3.11.x
As an experiment, I changed nsslowkey_GetPWCheckEntry to simple set the 
entry.salt.len to zero if there was no salt, and to continue, rather than 
failing.  This makes certutil -K run to completion as before.

I will attach a patch with the change that I made to nsslowkey_GetPWCheckEntry
However, I am not at all certain that this is the right change to make.

The questions I have are: 
- What is the significance of the key DB not having a global salt?  and,
- What should we do about it?  Should we create one?  and,
- How does a key3.db get into that state of having no global salt?
Bob, please review, and please read the preceding comments in this bug 
before giving your review comments.  Again, while this solves the 
immediate symptom, I am not sure it is right.  The cure may be worse
than the disease, if it leaves the key DB in some insecure state.

If you know a better solution, please take this bug and implement that 
better solution.
Assignee: rrelyea → nelson
Status: NEW → ASSIGNED
Attachment #281924 - Flags: review?(rrelyea)
Summary: NSS 3.12 alpha sees no keys in key3.db that works OK with 3.11.x → NSS 3.12 alpha treats a key3.db with no global salt as having no password
Comment on attachment 281924 [details] [diff] [review]
ignore missing salt when checking for password

r+ rrelyea
Attachment #281924 - Flags: review?(rrelyea) → review+
More comments about lack of a global salt:

The global salt is used to 'salt' the password entry directly. When NSS uses the PBE for it's key database, it passes in a 'Password' to the PBE which is the hash of the users real password with the global salt. If the gobal salt does not exist, then a given password will always hash to the same key.

The loss of the global salt in a single, or small number of databases isn't a big problem, but a widespread outage would be.

Changing the password on the database should correct the problem.
BTW each entry also has a local salt value, to things like the password check entry will have the different values even for the same key without any global salt.

bob
I think we should not silently ignore the absence of a global salt.
If we have the ability to create one, we should.  If we need to decrypt
and re-encrypt some entries to use the new salt (do we?), we should.  

I agree that we should find out how widespread this problem is.  If some
code is now routinely generating key DBs without global salts, we should 
fix that ASAP.

The first place I'd suggest we look is in the reset master password (key db)
code.
In reply to comment 8, then what is the global salt used for?
It salts the password key (the magic key NSS keeps internally whenever you are logged in).

master reset removes all the entries in the key database and returns the keydb to NEED_INITIALIZE state (all the keys and the password entry are gone).

If it had just removed the salt, there would be no way to decrypt any of the entries in the database (even if it had 'no password'). It's clear the password entry was generated with no global salt.

Anyway the attack vector for having no global salt is an on machine-invade-the-process attack (not really very interesting).

bob
Bob, can't a dictionary attack be mounted against a password encrypted with
no salt?  I wouldn't call that an "invade-the-process" attack.  The attacker
needs only to get a copy of the key3.db file.
Checking in keydb.c;  new revision: 1.5; previous revision: 1.4

The immediatel symptom is fixed by this commit, but I'm not sure I'd 
call the problem fixed.
I will file a separate bug about the existence of key DBs without global salts.
Status: ASSIGNED → RESOLVED
Closed: 17 years ago
Resolution: --- → FIXED
re comment 12: No. each entry also has it's own salt (including the password check entry), so even without the global salt, each entry is diversified. The global salt only affects the intermediate derived key, so the only practical dictionary attack is one which can access the intermediate derived key (which requires access to the process).
Flags: blocking1.9?
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: