NFN Smith wrote:
[email protected] wrote:
I'm beginning to suspect that some web developers are starting to use
two-page login forms deliberately to prevent their users from using
password managers on the assumption they won't be secure, rather than
leaving it up to their users to ensure they store their passwords
securely. In which case, even if something is done in the browser which
works most of the time, those web developers may make sure they hit the
conditions for it to not work for their site and the whole cycle would
start again...

Some of it may be a way of defending against passwords "remembered"
(whether in the browser, as with Mozilla, or in the way that IE keeps
stuff in the Windows registry). Given the antipathy of some developers
towards Mozilla (including the long-time problem of improper sniffing
methodologies, looking explicitly for "Firefox", rather than "Gecko",
and sometimes causing for Gecko browsers that aren't Firefox), I think
there's some number of developers that aren't really thinking much about
the Mozilla method of handling passwords.

Yeah, I think the concern about letting the browser remember passwords is more those which don't need the user to enter a master password to access them. Even if the passwords are encrypted, if the user doesn't have to enter a password to get at them the decryption key must be stored somewhere on the system, so is just as accessible to anyone able to steal the password database. Letting the user use a password manager might even makes it more likely that they'll choose a more secure password (longer, more difficult to guess) since they don't have to remember it.

However, I think developers are more focused on defending against
script-based authentication (presumed to be malicious). By requiring
multiple user inputs, then it's far more difficult for an attacker to
present credentials -- not only valid credentials, but a way of
defending against brute-force guessing.

Perhaps that's also part of it. But it only doubles the number of requests needed to brute force the password (assuming the username has to be entered again after each attempt at the password). There are more effective ways of slowing that down, such as only allowing say 5 attempts for a given username before locking the account for 5 minutes (if the error message doesn't differentiate between incorrect username/password and account locked, the attacker won't be able to use that to know if they've got the username right). Most users aren't delayed at all, but an attacker can only make 5 attempts every 5 minutes, and may not even know that that's what the limit is (so might even happen to try the correct password while the account is locked).

And this kind of methodology
achieves a lot of the same kind of benefit as CAPTCHA, without annoying
users with CAPTCHA images that are difficult to decipher.

I've noticed that multiple-stage logins seem to be most common with
financial institutions.

Yeah, but they (or at the ones I've used) tend to do other things which can't be handled by a password manager anyway, like ask for 3 given digits out of an 8 digit number plus a another piece of "memorable information" (effectively a second password). Or use a chip+pin card reader to log in.

I haven't checked it, but my suspicion is that a tool such as KeePass
might have capacity of scripting a multiple-stage login.

Possibly; I keep meaning to look into that. I don't have it here right now to look, but from what I recall I think it has a default method of automatically filling in login forms (which should work for most basic cases) but flexibility so you can tell it how to identify the relevant fields on a site-by-site basis. Not sure whether it handles submitting the username and password on separate pages though...

--
Mark.

_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to