Please make it possible to use different keyrings (not only the default one)
Reported by
stu...@anchev.net,
Sep 27 2017
|
||
Issue descriptionUserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36 Steps to reproduce the problem: Chromium uses the default Gnome keyring and there is no option to ask it explicitly to use a separate one. What is the expected behavior? It is preferable to have chromium store its data in a separate keyring rather than having all applications storing (and hence being able to read) all data in the same keyring. What went wrong? No option for using a particular keyring. Did this work before? No Chrome version: 61.0.3163.100 Channel: stable OS Version: Flash Version: Shockwave Flash 27.0 r0 Reopening of auto archived #650600
,
Sep 27 2017
Thanks.
,
Sep 27 2017
Can you describe a kind of attack that would be prevented by such a feature? Currently we use keyring to protect against someone physically stealing your hard drive. That scenario is not affected by adding more than one keyrings. In general, I view trying to defend against a compromised system as a lost battle. There are all kinds of damage that a malicious app can do besides reading your keyring. Not to mention that it can also just wait until you unlock your keyring for Chrome and read everything then. If you need to run untrustworthy apps on purpose, never do it with your personal user.
,
Sep 27 2017
Scenario: A malicious software (e.g. "I want to test this new browser") gets access to the default keyring and steals all your login credentials for your email, bank website etc. Isolating Chromium's data into a separate keyring would prevent it. "If you need to run untrustworthy apps on purpose, never do it with your personal user." - that won't work for a general user who doesn't even understand what an untrustworthy app is. Yet you can protect that user by giving him an extra layer of security by isolating the keyring.
,
Sep 27 2017
The general user doesn't know what keyring is and shouldn't have to. Nor can we expect the general user to sufficiently clean up their system after executing a malicious application. A security-conscious user, who is willing to tire themselves with managing multiple keyrings, should know better than to execute a malicious app in their everyday environment in the first place.
,
Sep 27 2017
Chrome and other LOCAL applications can store credentials in the default keyring. A non-general user may not want their local stuff shared on the same keyring with an Internet application. If you refuse to provide such isolation, this raises the question "How safe is Chrome at all if the approach to security is `the general user doesn't know, so we will neither tell them they are exposed, neither help them not to be`?" |
||
►
Sign in to add a comment |
||
Comment 1 by infe...@chromium.org
, Sep 27 2017Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Feature
Owner: cfroussios@chromium.org
Status: Assigned (was: Unconfirmed)