Поиск в Поддержке

Избегайте мошенников, выдающих себя за службу поддержки. Мы никогда не попросим вас позвонить, отправить текстовое сообщение или поделиться личной информацией. Сообщайте о подозрительной активности, используя функцию «Пожаловаться».

Learn More

Firefox and hibernation plain text vulnerability

  • 3 ответа
  • 0 имеют эту проблему
  • 21 просмотр
  • Последний ответ от cor-el

more options

Hi, I use windows hibernate a lot. One vulnerability of hibernate is that the contents of RAM get written to the hard drive in unencrypted form in a file called hiberfil.sys. This means that any encryption keys in RAM used to access encypted files will be written to hiberfil.sys and can be extracted if a malicious party has physical access to the drive.

Thus, the question:

Does Firefox store encryption keys, passwords, or log in details in RAM at any time while in use?

Thanks.

Hi, I use windows hibernate a lot. One vulnerability of hibernate is that the contents of RAM get written to the hard drive in unencrypted form in a file called hiberfil.sys. This means that any encryption keys in RAM used to access encypted files will be written to hiberfil.sys and can be extracted if a malicious party has physical access to the drive. Thus, the question: Does Firefox store encryption keys, passwords, or log in details in RAM at any time while in use? Thanks.

Все ответы (3)

more options

I *assume* that a key or hash generated from my Primary Password is stored in memory so that Firefox can fill my saved logins on forms without prompting me for that password every single time. (Info on that password: Use a Primary Password to protect stored logins and passwords.)

You could investigate how add-on password managers work and see whether any of those would be more secure.

Полезно?

more options

jscher2000 - Support Volunteer said

I *assume* that a key or hash generated from my Primary Password is stored in memory so that Firefox can fill my saved logins on forms without prompting me for that password every single time.

Good point but it could also be that Firefox generates an authorization token of some kind instead of exposing the key in RAM.

Полезно?

more options

When you fill the Primary Password then you login to the Software Security Device and this is a stand-alone NSS device that is accessed via a secure local connection, but the passwords can be visible on the about:logins page. You can/should logout (cancel a PP prompt or logout via Security Devices) to ensure that the logins are locked again and can't be accessed if the device is left unattended.

  • Settings -> Privacy & Security -> Certificates -> Security Devices

Полезно?

Задать вопрос

Для ответа на сообщения вы должны войти в свою учётную запись. Пожалуйста, задайте новый вопрос, если у вас ещё нет учётной записи.