back to article LastPass now supports 2FA auth, completely undermines 2FA auth

Password manager LastPass has added a new feature to its software: the ability to store two-factor authentication codes. This is great news. For hackers. Increasingly, people with sense use two-factor auth as a way of ensuring that it is much harder for miscreants to break into their accounts, and to detect if anyone is anyone …

Page:

  1. bex

    I agree

    I noticed lastpass was wittering on about my problem of typing in 6 digits. I think I will carry one using authenticator plus and suffer from the "Real" hassle it causes.

  2. Hoe

    Don't get why people would move because of this silly feature, surely the easy option is just don't use the feature?

  3. Bastard Sheep

    Lastpass Authenticator is made by the same company, but it's a different product. A separate app. You install it on your phone, it operates no differently and no less secure than using Google, Microsoft, Duo, or anybody elses authenticator app on the same phone.

  4. mr_souter_Working
    Black Helicopters

    One of the biggest issues

    Most people use the same username on all sites - and usually the same email address

    personally, I use a different (and random) email address (from one of the 3 domains that I own) for most sites, together with a unique password for that site. It gives me the advantage of knowing if a site has been hacked (or has just sold my information), as I then see spam coming to an address that was only ever used on that single site.

    Never sign in with any Social credentials (Facebook, Google+, Microsoft, etc...)

    I also use a combination of KeePass for day to day stuff (several copies stored in different locations and synced every few weeks), encrypted text files contained in encrypted zip files on an encrypted USB stick for truly important stuff (with encrypted backups on my home NAS and at least one offline USB drive).

    Me? paranoid? never! who said that I was?

    1. Anonymous Coward
      Anonymous Coward

      Re: One of the biggest issues

      "personally, I use a different (and random) email address (from one of the 3 domains that I own) for most sites, together with a unique password for that site."

      I used to do that - and could alert suppliers when their unique address appeared in spam. Then Vodafone outsourced the Demon email service to a Microsoft 365 service. That now limits the addresses in your Demon subdomain to a maximum of 100 - and you have to register a new one before you can use it.

      1. To Mars in Man Bras!
        Headmaster

        Re: One of the biggest issues

        >>I use a different (and random) email address (from one of the 3 domains that I own)...

        [engage Michael Caine voice]

        Not a lot of people know this. But, if you use Gmail, you can also do this by adding +<something> to your gmail address and the emails will still get to you.

        So, if your email is fred@gmail.com, you can sign up at Acme Widgets website with fred+acme@gmail.com. Then when you start getting spam at that address, you'll know exactly who sold on your data. I. have a junk Gmail address for exactly this purpose.

        Also works on your own domains, if you use Google's mx servers to handle your email for those domains.

        [Of course, needless to say, some eejit websites' email validators won't accept an email address with a + in it as being legit]

  5. Anonymous Coward
    FAIL

    Non issue?

    "However, many companies, including Google, Facebook and Dropbox also offer the ability to generate one-off access codes from a device or app. You usually scan a barcode unique to your account, and this is used to calculate a sequence of access codes, with a new code every minute or so."

    Yeah, if someone manages to get into your LastPass account, sure. But wasn't that advantage already removed the very moment when the user themselves opted not to use a device such as a phone but instead opted for a one-off access code which is being sent to the same machine which they used to provide their username and password on?

    How is this any different?

    1. Charles 9

      Re: Non issue?

      If they can pwn the point of entry, then any other kind of entry screening is moot since they still have to go through the point of entry. IOW, 2FA isn't going to work not because it's going to the same point as the pwned point of entry but because it'll have to go through the pwned point of entry anyway.

  6. William 3 Bronze badge

    Complex passwords stuck on a post it note under your desk

    Is quite simply the best security policy.

    The reason being that if someone has physical access to your computer then all bets on security are off.

    That inch of wood between your keyboard and the password fools any and all internet hackers.

    If someone is in your house, you have bigger fish to fry then your facebook/the register forum passwords.

    1. Anonymous Coward
      Anonymous Coward

      Re: Complex passwords stuck on a post it note under your desk

      "If someone is in your house, you have bigger fish to fry then your facebook/the register forum passwords."

      I wouldn't do that in the office - but I totally agree about using the method at home. My bank account is secured by a stand-alone 2FA device to which the pin is in my head.

      1. Charles 9

        Re: Complex passwords stuck on a post it note under your desk

        So what if you have a bad day and FORGET the PIN?

    2. Orv Silver badge

      Re: Complex passwords stuck on a post it note under your desk

      I always told people if they had to write down the password, to stick it in their wallet. Most people are very careful to not let their wallet out of their sight, and if it's ever stolen they'll know it and can change the password.

      1. Charles 9

        Re: Complex passwords stuck on a post it note under your desk

        Unless, of course, you're MUGGED and they take advantage while in an unconscious heap.

  7. Anonymous Coward
    Anonymous Coward

    Is this really 2FA?

    I don't really understand how these mechanisms can claim to be 2FA, if the second factor can be reduced to a piece of information that can be digitally duplicated into your LastPass. It's two things you know: your password and the seed value. Thats 1FA, not 2FA.

    For it to be a real "something you have" factor, the key needs to be hidden inside some kind of hardware, like an RSA key or one of those bank PIN devices.

    1. Charles 9

      Re: Is this really 2FA?

      And what if you LOSE it? Or they break the system like in the RSA attack? People lose their keys already, let's not try to add something ELSE to lose?

      1. Anonymous Coward
        Anonymous Coward

        Re: Is this really 2FA?

        @Charles 9: if you lose your physical token, you're locked out until the administrator issues you a new one.

        If your data is not sensitive enough to justify the extra hassle of 2-factor authentication, don't use 2-factor authentication.

        I just don't like seeing people claiming their authentication system is 2FA when it's not.

        1. Charles 9

          Re: Is this really 2FA?

          What happens when you routinely have to handle sensitive data BUT you're also highly prone to losing things like your keys, meaning you're likely to lose the fob?

          1. Anonymous Coward
            Anonymous Coward

            Re: Is this really 2FA?

            If the data's sensitive enough to require 2-factor authentication, and you can't work 2-factor authentication, then the only answer is to give the job to someone else.

            1. Anonymous Coward
              Anonymous Coward

              Re: Is this really 2FA?

              And if there's NO ONE else because you're also the highly-trained (but eccentric) specialist? Don't diss edge cases and Murphy. They don't stay that way for long.

              1. Anonymous Coward
                Anonymous Coward

                Re: Is this really 2FA?

                If 2FA is impractical in your contrived edge case, then I suppose you'll have to fall back to using 1 factor authentication. But don't kid yourself that your 1FA scheme is 2FA.

                1. Charles 9

                  Re: Is this really 2FA?

                  I'm not. I'm just saying that for many 2FA smacks of "hoop jumping," and you know how people think about hoop jumping.

    2. Orv Silver badge

      Re: Is this really 2FA?

      RSA keys also use a seed value, so in that sense it's all information. The distinction between "something you have" and "something you know" is subtle. I have an RSA key, which has a seed on it. I have my phone, which has a seed on it. The only distinction is that one of them is a specialized computing device, and the other is general-purpose.

      1. Anonymous Coward
        Anonymous Coward

        Re: Is this really 2FA?

        These pseudo-2FA systems use a seed that an end user can access, copy and put into another program. Real 2FA systems use a seed that's sealed inside tamper-resistant hardware, and can't be accessed without physically possessing and destroying the hardware. That seems a clear distinction to me.

  8. icefyre127

    The analysis in this article is incomplete and misses the mark...

    I understand the worry about "putting your eggs in one basket" however the argument against Lastpass's support of 2FA is incomplete. If you decide to use the absolutely worst configuration for lastpass then yes, the article is correct. However, most LastPass users use 2FA to access lastpass and the more security conscious among us also make sure LastPass sessions are not perpetual.

    If you are on my lastpass it means you are either me (as I have used 2FA to authenticate) or you have hijacked my machine. However, if you've hijacked my machine, you can just steal my session cookies or route your connection through my device to get into any account requiring 2FA not to mention you probably already have a keylogger installed. If your device is insecure, your accounts are toast. If your device is secure, then there is no threat to your other accounts protected by 2FA. Why do you need to juggle 7 different seeds instead of securely authenticating once with 2FA and then accessing your accounts? BTW, the argument used by this article can also be leveled at any application that aggregates 2FA seeds, for example, Google Authenticator...

    If someone hacks your google authenticator they have access to all of the 2FA seeds stored in that application. To hack Google Authenticator you would need to compromise the device (same as lastpass). What is the solution? Would storing your authentication tokens on 7 different authentication apps make you more secure? Most likely not. If the device is compromised, all of those apps are likewise probably compromised. The only thing you've done is made people less likely to use 2FA because no one wants to juggle 7 different authentication apps (any one of which could contain security vulnerabilities which further decreases your device's security).

  9. icefyre127

    The other side of the argument

    I understand the worry about "putting your eggs in one basket" however the argument against Lastpass's support of 2FA is incomplete. If you decide to use the absolutely worst configuration for lastpass then yes, the article is correct. However, most LastPass users use 2FA to access lastpass and the more security conscious among us also make sure LastPass sessions are not perpetual.

    If you are on my lastpass it means you are either me (as I have used 2FA to authenticate) or you have hijacked my machine. However, if you've hijacked my machine, you can just steal my session cookies or route your connection through my device to get into any account requiring 2FA not to mention you probably already have a keylogger installed. If your device is insecure, your accounts are toast. If your device is secure, then there is no threat to your other accounts protected by 2FA. Why do you need to juggle 7 different seeds instead of securely authenticating once with 2FA and then accessing your accounts? BTW, the argument used by this article can also be leveled at any application that aggregates 2FA seeds, for example, Google Authenticator...

    If someone hacks your google authenticator they have access to all of the 2FA seeds stored in that application. To hack Google Authenticator you would need to compromise the device (same as lastpass). What is the solution? Would storing your authentication tokens on 7 different authentication apps make you more secure? Most likely not. If the device is compromised, all of those apps are likewise probably compromised. The only thing you've done is made people less likely to use 2FA because no one wants to juggle 7 different authentication apps (any one of which could contain security vulnerabilities which further decreases your device's security).

    1. Charles 9

      Re: The other side of the argument

      Unless, of course, they just hack LastPass itself, steal the contents, AND figure out ways to crack or hack them, which is not outside the realm of possibility. Then they can pwn you without hacking you.

      1. icefyre127

        Re: The other side of the argument

        They are free to hack lastpass. The way the architecture works Lastpass only stores an encrypted blob so the contents can't feasibly be obtained unless the master password is very weak. Lastpass doesn't even hold your master password. The only problem I see is if hackers somehow manage to replace the lastpass add-on with a malicious version in the app store and make people update to it. That means that Lastpass's certificate was compromised and that someone had the credentials to upload to the store and that there was no control to detect that a new extension/app was deployed without the relevant change control. I would say that the risk of all of that is much lower than the risk of having one password compromised and then having multiple accounts compromised because you were using the same password.

        1. Charles 9

          Re: The other side of the argument

          But because all the eggs are in one basket, so to speak, someone could be motivated enough to try to break LastPass's system so as to get at the motherlode. Look at the attack on RSA for the level of motivation available to a determined hacker.

  10. JimmyPage Silver badge
    Stop

    A lot of overthinking here ...

    I would bet it's a given that no one here will be affected by any sort of "hack" - almost by definition El Reggers are the 5%.

    It will be the 95% who haven't a clue that will fall victim, because not only are criminals stupid, but they are lazy and stupid.

  11. Reliance

    Fewer Secrets

    I feel it helps to limit on-line access to financial accounts. I can logon to my bank, but my account type won't let me move money around. The hacker in Moldavia can't transfer fund from my bank to his.

    So the weakest point is online shopping. If they can logon and ship something from Amazon to their place, they got me. But Amazon has the address. Not a good way for the Moldovan hacker to get rich.

    So what's left? They can hack into my Register account and put comments in under my name. So maybe, worst case, this message is from the hacker, not "Me".

    1. Charles 9

      Re: Fewer Secrets

      OR they can glean your details and use that in social engineering to get better access to your more-sensitive stuff through identity theft.

  12. MrPete

    It's not as if people tend to jump to conclusions either :)

    Note that the guy who reported "serious problems" with LastPass Authenticator app later had to retract his primary concern: NO, it never was possible to hack in and gain access. That was his own misunderstanding based on an invalid test (using a local image rather than the actual LP-site-based image.)

    Their only real vulnerability was to remote turn-off of 2FA. And that's been fixed.

    Interestingly, LastPass has proven the security of their system the hard way: their central servers were hacked... and nothing useful was obtained or obtainable about their customers! They don't know, and don't have access to, your passwords, keys or anything else of use to a hacker.

    I agree with others, based on experience: NO technology is completely secure. Everything has bugs, everything can in some way be hacked given sufficient time and knowledge of the humans involved. At this point, after extensive testing, I am using LP personally and with family.

    LP certainly is not perfect: I have found numerous bugs in the UI, pain-in-the-neck feature implementations, etc etc. But nothing that exposes confidential information. (The main thing I don't like: I can share a record with another account, but the actual password is locked from visibility. In many use cases, that is unacceptable.)

Page:

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon