by codeka on 12/27/17, 4:32 PM with 113 comments
by zupzupper on 12/27/17, 5:56 PM
The bug the article is detailing is in the Authenticator application, not the Password Manager application, which wasn't very clear to me on my first read.
by dzhiurgis on 12/27/17, 9:39 PM
https://news.ycombinator.com/item?id=15756044
This was just over a month ago, and published only here.
by darrmit on 12/27/17, 4:54 PM
So many better designed, more secure options out there. KeePass, Bitwarden, or 1Password to name a few.
by ComputerGuru on 12/27/17, 5:15 PM
Are you ready?
You log in to their support forums and online community with the same password you decrypt your vault with.
[0]: https://neosmart.net/blog/2017/a-free-lastpass-to-1password-...
EDIT:
To answer some of the comments, since understandably not everyone is a security expert:
What happens if LastPass’s web forum is compromised and all their additional security counts for nothing?
Even if not: you have no problem with people being conditioned to enter the password securing all their passwords repeatedly into random pages for random content not related in any way, shape, or form to their vault in a web browser?
Containment is the name of the game. It’s hard enough making one app secure enough to enter your password into. Then extending that with an SSO, relying on The security of none other than notoriously crappy phpBB, vulnerable to upstream code injections, XSS, phishing attacks, and god knows what else, and you still think you can trust them to keep your master password secure?
LastPass is such a juicy target and this is such an easy attack vector that I can virtually guarantee at some point phpBB - or, more accurately, their abuse of it - will be a massive liability and the source of a huge catastrophe for them, if it hasn’t secretly already.
Of course they know to treat changes to their authentication apps very carefully and code review each and every syllable added or removed (well, I hope so). But do they review upstream patches to the forum software they use? What about the third party template they have installed? Do they hold off on patches after a security bug is discovered in phpBB so they can review the code changes? Do they even upgrade their forums? What about a vulnerability in PHP itself? Do they secure the server hosting their authentication apps in the same manner as the server hosting their forums? Do their web developers undergo the same background checks and scrutiny their core developers undergo? How many sysadmins have access to the website? Do they provide the same access monitoring to people managing an ancillary feature like their forum software?
The list just goes on forever. You’re as secure as the weakest link. All anyone that want to break into LastPass has to do is get some code into phpBB or the random phpBB themes and plugins they use and it’s game over for millions of LP users and billions of credentials worldwide.
See the problem?
by scarhill on 12/27/17, 6:19 PM
Still, it's definitely a bug. They should either fix it or remove the feature so people aren't misled into thinking their two-factor codes are secure when they're not.
by ilyagr on 12/27/17, 7:05 PM
All I get from the article is that the user might be able to see the OTA codes in a roundabout way. If that's the entire problem, why is it a problem?
by zwerdlds on 12/27/17, 5:12 PM
But no follow-up via email? Maybe it's time to start looking at other options.
by exabrial on 12/27/17, 5:07 PM
by strictnein on 12/27/17, 5:16 PM
by david-cako on 12/27/17, 4:49 PM
I will never trust my passwords all being in one place other than my brain.
by mankash666 on 12/27/17, 8:26 PM