Skip to main content
Top

2015 | OriginalPaper | Chapter

Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers

Authors : Frank Stajano, Max Spencer, Graeme Jenkinson, Quentin Stafford-Fraser

Published in: Technology and Practice of Passwords

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Subtle and sometimes baffling variations in the implementation of password-based authentication are widespread on the web. Despite being imperceptible to end users, such variations often require that password managers implement complex heuristics in order to act on the user’s behalf. These heuristics are inherently brittle. As a result, password managers are unnecessarily complex and yet they still occasionally fail to work properly on some websites. In this paper we propose PMF, a specification of simple semantic labels for password-related web forms. These semantic labels allow a software agent such as a password manager to extract meaning, such as which site the login form is for and what field in the form corresponds to the username. Our spec also allows the agent to generate a strong password on the user’s behalf. PMF reduces a password manager’s dependency on complex heuristics, making its operation more effective and dependable and bringing usability and security advantages to users and website operators.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
2
Users of password managers are still exposed to malware; we are not claiming that the security offered by password managers is absolute (see Sect. 5). Besides, our proposal implicitly also supports higher-security password managers running on dedicated hardware.
 
3
The latest version (as well as a complete revision history) of the PMF specification can be found at https://​github.​com/​pmfriendly/​pmf-specification.
 
4
In these examples, grey highlights indicate PMF-related additions.
 
5
The values of these hidden inputs are usually populated by the web server when it generates the HTML of the page and then not changed on the client side. For example, web frameworks, such as Django [6], use them to implement Cross Site Request Forgery protection.
 
6
Often just an indication that the back-end is not even hashing the passwords, as observed by Bonneau and Preibusch [8].
 
7
Within reasonable limits, though, to avoid denial of service—allowing passwords of several megabytes brings no security benefit and does more harm than good. To paraphrase an ancient Unix quip, “passwords in PMF may be infinite in length, where infinity is set to 256 characters”..
 
8
This is not to say that humans could never use passwords or passphrases of that length, or that passwords of that length are necessarily always unguessable. What we mean instead is that, once we agree that a competent and non-malicious agent is generating strong random passwords on behalf and in the interest of the user, once we reach t characters then further checks are not necessary. Checking that the t characters aren’t “easy” (e.g. all the same) goes against the hypothesis that it’s in the agent’s interest to generate them at random. And if the agent is compromised then all bets are off, as it could also generate a random-looking password that the attacker could recover. So, additional checks beyond that of the length are not useful.
 
9
See footnote 7.
 
10
In our latest PMF specification, besides always requiring the semantic markup described in the other sections, we define full PMF compliance as requiring that the policy accept passwords of length over t regardless of their composition but we still grant partial compliance to websites that don’t implement this exception. Partially PMF compliant sites still allow reliable automated interaction for login, even though they don’t guarantee that the software agent will be able to define a compliant strong password.
 
11
Of course a human could generate a 100-character password, but they’d have little incentive to do so knowing that they’d have to retype it every time. And, in making the heuristic fail, they’d only damage themselves. What we mean is that no human will generate a 100-character password unless they explicitly and masochistically set out to fool the heuristic—in which case they get what they deserve.
 
12
The travelling user would not want to sync their passwords to the browser in the cybercafé. Instead of transcribing a random password to the cybercafé’s browser (which would still be exposing that account), they should use the PMF-enabled browser in their smartphone. This end-to-end solution using a trusted terminal would be more usable and more secure than either of the alternatives involving the cybercafé’s browser, and would not require any transcribing.
 
13
Note how our new requirement of adding the “if length \(>t\)” statement to the policy may at some level represent a more significant change to the website but in practice involves much less work than our old requirement of accurately expressing the existing password composition policy in machine-readable form.
 
14
As an example, 1Password alone is estimated to have a install base of 2 to 3 million users.
 
15
Auto-filling of forms by the password manager improves usability and therefore, before mitigating this vulnerability by disabling the auto-filling, careful consideration is needed of the inherent trade off between security and usability. We shouldn’t lose sight of the fact that normal users don’t have threat models; therefore, simply asking them whether they want to enable or disable auto-filling is a bit of a cop out.
 
16
A bookmarklet is a bookmark containing JavaScript that can be used to extend a web browser’s capabilities. Bookmarklets have advantages over alternatives such as addons or extensions as they are cross browser and are managed by the user like bookmarks.
 
Literature
3.
go back to reference Berjon, R., Faulkner, S., Leithead, T., Doyle Navara, E., O’Connor, E., Pfeiffer, S., Hickson, I.: HTML 5.1. Working draft, W3C (2014) Berjon, R., Faulkner, S., Leithead, T., Doyle Navara, E., O’Connor, E., Pfeiffer, S., Hickson, I.: HTML 5.1. Working draft, W3C (2014)
4.
go back to reference Hickson, I., Berjon, R., Faulkner, S., Leithead, T., Doyle Navara, E., O’Connor, E., Pfeiffer, S.: HTML5. Recommendation, W3C, October 2014 Hickson, I., Berjon, R., Faulkner, S., Leithead, T., Doyle Navara, E., O’Connor, E., Pfeiffer, S.: HTML5. Recommendation, W3C, October 2014
7.
go back to reference Bonneau, J., Xu, R.: Of contraseñas, sysmawt, and mìmǎ: Character encoding issues for web passwords. In: Web 2.0 Security & Privacy, May 2012 Bonneau, J., Xu, R.: Of contraseñas, sysmawt, and mìmǎ: Character encoding issues for web passwords. In: Web 2.0 Security & Privacy, May 2012
8.
go back to reference Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: WEIS 2010 (2010) Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: WEIS 2010 (2010)
10.
go back to reference Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web. WWW 2007, pp. 657–666. ACM, New York (2007) Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web. WWW 2007, pp. 657–666. ACM, New York (2007)
12.
go back to reference Gasti, P., Rasmussen, K.B.: On the security of password manager database formats. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 770–787. Springer, Heidelberg (2012) CrossRef Gasti, P., Rasmussen, K.B.: On the security of password manager database formats. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 770–787. Springer, Heidelberg (2012) CrossRef
13.
go back to reference Silver, D., Jana, S., Boneh, D., Chen, E., Jackson, C.: Password managers: attacks and defenses. In: Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), pp. 449–464. USENIX Association, San Diego, August 2014 Silver, D., Jana, S., Boneh, D., Chen, E., Jackson, C.: Password managers: attacks and defenses. In: Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), pp. 449–464. USENIX Association, San Diego, August 2014
14.
go back to reference Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), pp. 465–479. USENIX Association, San Diego, August 2014 Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: Proceedings of 23rd USENIX Security Symposium (USENIX Security 14), pp. 465–479. USENIX Association, San Diego, August 2014
15.
go back to reference Adida, B., Barth, A., Jackson, C.: Rootkits for javascript environments. In: Proceedings of the 3rd USENIX Conference on Offensive Technologies. WOOT 2009, p. 4. USENIX Association, Berkeley (2009) Adida, B., Barth, A., Jackson, C.: Rootkits for javascript environments. In: Proceedings of the 3rd USENIX Conference on Offensive Technologies. WOOT 2009, p. 4. USENIX Association, Berkeley (2009)
16.
go back to reference West, M.: Credential Management Level 1. Working draft, W3C (2015) West, M.: Credential Management Level 1. Working draft, W3C (2015)
17.
go back to reference Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011) CrossRef Stajano, F.: Pico: no more passwords!. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49–81. Springer, Heidelberg (2011) CrossRef
18.
go back to reference Stajano, F., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q., Warrington, C.: Bootstrapping adoption of the pico password replacement system. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 172–186. Springer, Heidelberg (2014) Stajano, F., Jenkinson, G., Payne, J., Spencer, M., Stafford-Fraser, Q., Warrington, C.: Bootstrapping adoption of the pico password replacement system. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds.) Security Protocols 2014. LNCS, vol. 8809, pp. 172–186. Springer, Heidelberg (2014)
Metadata
Title
Password-Manager Friendly (PMF): Semantic Annotations to Improve the Effectiveness of Password Managers
Authors
Frank Stajano
Max Spencer
Graeme Jenkinson
Quentin Stafford-Fraser
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-24192-0_4

Premium Partner