Encrypt passwords stored by the Password Manager with a more modern algorithm
Categories
(Toolkit :: Password Manager, enhancement, P3)
Tracking
()
People
(Reporter: tanvi, Unassigned)
References
(Blocks 1 open bug)
Details
(Whiteboard: [passwords:storage])
Comment 1•10 years ago
|
||
Comment 2•10 years ago
|
||
Comment 3•10 years ago
|
||
Comment hidden (advocacy) |
Comment hidden (advocacy) |
Comment hidden (off-topic) |
Comment hidden (off-topic) |
Updated•6 years ago
|
Comment 9•5 years ago
|
||
(In reply to Tanvi Vyas[:tanvi] from comment #0)
How easy/hard should it be for a user to view the passwords saved in the
password manager?
Bug 1194529 protects against snooping by default on Windows and modern macOS.
What should they be encrypted with locally?
Bug 524403 is now fixed so key derivation is up to modern standards (PDKDF2 with 10,000 iterations when a master password is enabled).
We discussed FxA again but decided against it.
What encryption algorithm is used today (with the master password)? Is it strong enough, or should we replace it with something else?
We are still using 3DES-CBC. This bug can track switching to a more modern algorithm for that. This migration will probably happen as part of the move to the Rust logins storage library.
Updated•5 years ago
|
Updated•2 years ago
|
Description
•