Elcomsoft claims capability to break 1Password

Options
jerryr56
jerryr56
Community Member

Elcomsoft is a Russian company that supplies expensive forensic software for government agencies and other criminals. In this blog post, they claim that breaking into 1Password is a piece of cake for their "Elcomsoft Distributed Password Recovery" tool. Have you guys seen this? Any comments?

https://blog.elcomsoft.com/2017/08/one-password-to-rule-them-all-breaking-into-1password-keepass-lastpass-and-dashlane/


1Password Version: 6.8.1
Extension Version: Not Provided
OS Version: OS X 10.12.6
Sync Type: None

Comments

  • jerryr56
    jerryr56
    Community Member
    Options

    Down in the comments for the blog post, Elcomsoft admits that their brute force approach only works against weak passwords. I assume you agree? False alarm, sorry.

  • Lars
    Lars
    1Password Alumni
    Options

    @jerryr56 - Yep, we saw it back when it first came out in August of last year. This isn't the first time they've tried to crack into 1Password keychains. Last time they tried it, this was their conclusion on Twitter.

    This time around, as you can see in the comments the back-and-forth between the article's author and our Chief Defender Against the Dark Arts, Jeff Goldberg, they apparently got hold of a copy of an older Agile Keychain that did not have as many rounds of PBKDF2 as all current versions do. Bottom line: your data is quite safe, provided you choose a good Master Password. If you'd prefer the singing version of how to choose a good Master Password, well, we’ve got you covered there as well. Let us know if you have any questions!

  • wkleem
    wkleem
    Community Member
    Options

    Unfortunately I think, there is no way of testing master passwords before use, is there? No strength indicators etc.

  • Lars
    Lars
    1Password Alumni
    Options

    @wkleem - we don't have a password-strength meter for creating your Master Password, but we've written multiple documents over the years on how to choose a good Master Password. We've even got the singing version. :)

  • wkleem
    wkleem
    Community Member
    Options

    Thanks @Lars,

    I am familiar with that document. Still it doesn't help that when as we get older most the time the brain cells appear lacking at times. :(

  • Ben
    Options

    Understood. Thanks for the feedback. :)

    Ben

  • Jo_ann77
    Jo_ann77
    Community Member
    Options

    I noticed that document too and was completely overwhelmed and thought what the ....
    Fortunately things where not as I horribly as I thought.
    After using the search button there where lots of topic on elcomsoft and the real deal regarding 1PW and I'm now looking at the article https://blog-cdn.agilebits.com/wp-content/uploads/2013/04/README.txt and definitely give it a go on this weekend.
    Not to say my 1PW generated 6 word code is not safe, but I want to make it as difficult as possible within the range of what I can remember.
    Although I have problems due to English not being my home language understanding the technical side of it I can understand that 1PW is one awesome program and very safe (what a relieve :-)
    Thanks for the extensive info you people give and standing by your product.

  • Lars
    Lars
    1Password Alumni
    Options

    @Jo_ann77 - you're quite welcome! Let us know if you run into any difficulty while getting set up. I might also recommend https://support.1password.com to you; it's a wonderful resource where you can find step-by-step how-to guides for most anything you want to do in 1Password. :)

  • balrog
    balrog
    Community Member
    Options

    Hi Lars,
    Interesting that i saw the article few days ago as well. As discussed here, it's just another classic brute force attack. Which is not a weakness per se in the 1password app, a weakness on how you choose the master password.

    BTW, the windows desktop and chrome extension does not show the master password strength, but the web interface on my.1password.com does show the the password strength bar graph which is green. Eyeballing mine is like 70 or 80% good.

    Am I reading it correctly or configured it incorrectly where I should not be storing it there as per best practices? I'm mildly novice in 1password as an FYI. Thanks.

    Regards,
    Balrog

  • AlwaysSortaCurious
    AlwaysSortaCurious
    Community Member
    Options

    They did a follow up to that post almost immediately after some pushback (the link is at the top) with new errors and how their original data set went wrong.

    https://blog.elcomsoft.com/2017/08/attacking-the-1password-master-password-follow-up/

    1Password's numbers are at the bottom of the passwords/per second list now.. way lower

  • Lars
    Lars
    1Password Alumni
    Options

    Thanks, @AlwaysSortaCurious -- you're quite right. If you'd like a more visual representation of what it looks like to crack a password by brute force, @balrog, the chart in this post will give you an idea. Feel free to ask any questions you have! :)

  • AlwaysSortaCurious
    AlwaysSortaCurious
    Community Member
    Options

    Thanks. That a fun entropy chart. Yeah, math is fun like that. I often don’t bother with special characters anymore (20 random alphanumeric beats 18 full keyboard every time and generally causes less agita with password rules and it’s easy to add a cap or special if needed rather than remove here and there the violators, so happy enough with max alphanumeric).

    It’s fun to see the numbers if anyone cares to figure it out. Special chars are not as special as they seem when you can make a password a couple of character longer.

  • It’s fun to see the numbers if anyone cares to figure it out. Special chars are not as special as they seem when you can make a password a couple of character longer.

    Exactly right. The power of exponential growth.

    I find it fascinating how much of that kind of thing is counter-intuitive though. It's difficult to fault someone for thinking otherwise.

    Rick

  • AlwaysSortaCurious
    AlwaysSortaCurious
    Community Member
    edited March 2018
    Options

    66,483,264,000,000,000,000 Length: 10 Chars: 96 (full keyboard printable)
    3,226,266,800,000,000,000,000 Length: 12 Chars: 62 (aphanumeric upper/lower)

    Unless I screwed up somewhere, that 2-character difference makes a couple of significant zeros with just 10 and 12 character passwords, go longer, oh me oh my.

    66.5 quintillion vs 3.2 sextillion.

  • AGAlumB
    AGAlumB
    1Password Alumni
    Options

    @balrog: We meet again. :naughty:

    BTW, the windows desktop and chrome extension does not show the master password strength, but the web interface on my.1password.com does show the the password strength bar graph which is green. Eyeballing mine is like 70 or 80% good.

    I think it makes sense for the web interface to show you password strength when creating a Master Password, but since that isn't something that can be done in the extension (or app, when we're talking about a 1Password.com account) I think it makes sense to not have that there. But let me know if you meant something else.

    Am I reading it correctly or configured it incorrectly where I should not be storing it there as per best practices? I'm mildly novice in 1password as an FYI. Thanks.

    If you mean storing your Master Password (and other account credentials) in a Login item in your 1Password.com account, there's nothing wrong with that. After all, an attacker would already need those to get in to view that item. Cheers! :)

  • AGAlumB
    AGAlumB
    1Password Alumni
    Options

    @AlwaysSortaCurious: I think even with a rounding error or two you'd be okay. ;)

    @balrog: And, relevant to both of you,

    Interesting that i saw the article few days ago as well. As discussed here, it's just another classic brute force attack. Which is not a weakness per se in the 1password app, a weakness on how you choose the master password.

    It's worth pointing out that the chart Lars linked to is not specific to 1Password, but applies generally to brute force methods of guessing passwords, to a website, for example. With 1Password, it's even harder since each guess requires some real computational work, thanks to PBKDF2 iterations being complex operations designed to slow down an attacker. :sunglasses:

  • balrog
    balrog
    Community Member
    Options

    Hi Brenty,
    Thanks for the explanation and the link. Refreshing for a forum where the the support people knows very well (and more) their product.

  • Lars
    Lars
    1Password Alumni
    Options

    @balrog - Thanks for the kind words, on behalf of brenty and myself. ❤️

This discussion has been closed.