New issue
Advanced search Search tips

Issue 769312 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Closed: Sep 2017
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux
Pri: 2
Type: Feature



Sign in to add a comment

Please make it possible to use different keyrings (not only the default one)

Reported by stu...@anchev.net, Sep 27 2017

Issue description

UserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36

Steps to reproduce the problem:
Chromium uses the default Gnome keyring and there is no option to ask it explicitly to use a separate one.

What is the expected behavior?
It is preferable to have chromium store its data in a separate keyring rather than having all applications storing (and hence being able to read) all data in the same keyring.

What went wrong?
No option for using a particular keyring.

Did this work before? No 

Chrome version: 61.0.3163.100  Channel: stable
OS Version: 
Flash Version: Shockwave Flash 27.0 r0

Reopening of auto archived #650600
 
Components: Internals>LocalDataEncryption
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Feature
Owner: cfroussios@chromium.org
Status: Assigned (was: Unconfirmed)
Not a security vulnerability, leaving for tracking as functional bug.

Comment 2 by stu...@anchev.net, Sep 27 2017

Thanks.
Can you describe a kind of attack that would be prevented by such a feature? Currently we use keyring to protect against someone physically stealing your hard drive. That scenario is not affected by adding more than one keyrings.

In general, I view trying to defend against a compromised system as a lost battle. There are all kinds of damage that a malicious app can do besides reading your keyring. Not to mention that it can also just wait until you unlock your keyring for Chrome and read everything then.

If you need to run untrustworthy apps on purpose, never do it with your personal user.


Comment 4 by stu...@anchev.net, Sep 27 2017

Scenario:

A malicious software (e.g. "I want to test this new browser") gets access to the default keyring and steals all your login credentials for your email, bank website etc. Isolating Chromium's data into a separate keyring would prevent it.

"If you need to run untrustworthy apps on purpose, never do it with your personal user." - that won't work for a general user who doesn't even understand what an untrustworthy app is. Yet you can protect that user by giving him an extra layer of security by isolating the keyring.
Status: WontFix (was: Assigned)
The general user doesn't know what keyring is and shouldn't have to. Nor can we expect the general user to sufficiently clean up their system after executing a malicious application.

A security-conscious user, who is willing to tire themselves with managing multiple keyrings, should know better than to execute a malicious app in their everyday environment in the first place.

Comment 6 by stu...@anchev.net, Sep 27 2017

Chrome and other LOCAL applications can store credentials in the default keyring. A non-general user may not want their local stuff shared on the same keyring with an Internet application. If you refuse to provide such isolation, this raises the question "How safe is Chrome at all if the approach to security is `the general user doesn't know, so we will neither tell them they are exposed, neither help them not to be`?"

Sign in to add a comment