> What is there to prove? The documentation *literally* says it is plain
> text.

The documentation isn't the code that is executed. The only source of 
truth is code and the proof is in the pudding, namely execution. However 
that was not my point at all, you didn't read what I said carefully enough.

You can prove me wrong easily, grep the Chromium state files (or the 
whole filesystem if you want) for your password and see if it returns 
something. Or else show me the plain text file where it is stored. 
Answer: It is

Now I've already investigated the issue and the file where your 
credentials are stored is:

--->
% less "$HOME/snap/chromium/common/chromium/Default/Login Data"
".../Login Data" may be a binary file.  See it anyway?
% file "$HOME/snap/chromium/common/chromium/Default/Login Data"
.../Login Data: SQLite 3.x database
<---

So much for plain text[1]. You could even go ahead and SQL dump it and 
see if you could find the password in the clear. I didn't. Which of 
course does not mean it is not easy to retrieve it.

> Also: Any attacker can just copy the entire browser profile to another
> machine and then access the passwords. So he does not have to care about
> the implementation details of the password storage at all.
 >
> On the other side, normal Chrome/Chromium (without Snap and this command
> line argument) is using Gnome Keyring to protect the passwords. In that
> case, the attacker would need the login password or a equivalent secret
> from PAM and friends.

Right. But as I said this was declined by policy reviewers and you are 
welcome to follow up in that link.

[1] https://en.wikipedia.org/wiki/Plain_text

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1996267

Title:
  [snap] Doesn't store encrypted passwords unless interface is connected

Status in chromium-browser package in Ubuntu:
  Confirmed

Bug description:
  In the Snap package of Chromium, Chromium is not protecting passwords
  with gnome-keyring (or KWallet).

  As a result, copying the Chromium profile directory from the snap
  directory gives access to all stored passwords. This is a HIGH
  security risk. Regular users who are used to storing their passwords
  in browsers are probably unaware of this.

  Note that Chromium is started with the command line option
  “--password-store=basic”. This hack should never have been released to
  the public.

  The Chromium documentation states:
  > --password-store=basic (to use the plain text store)

  
https://chromium.googlesource.com/chromium/src/+/master/docs/linux/password_storage.md

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1996267/+subscriptions


-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to