Bug 1828 - SB2 reveals WPA/WEP encryption key/password in plaintext
: SB2 reveals WPA/WEP encryption key/password in plaintext
Status: RESOLVED FIXED
Product: SB 2/3
Classification: Unclassified
Component: Setup
: 14
: All All
: P2 normal with 1 vote (vote)
: ---
Assigned To: Richard Titmuss
http://forums.slimdevices.com/showthr...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2005-07-16 07:39 UTC by Max Spicer
Modified: 2009-09-08 09:11 UTC (History)
1 user (show)

See Also:
Category: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Max Spicer 2005-07-16 07:39:23 UTC
Anyone who has access to the SqueezeBox2 and its remote can easily discover the
plaintext password for the WEP/WPA encrypted network to which it is connected. 
Once entered, this password should never be revealed.  SB2s tend to live in
lounges where they are easily accessible to friends, friends of friends at
parties etc.  Any of these people could deliberately or accidentally discover
the password when using the device.  This would potentially allow them to access
the wireless network or, in the common case of password reuse, to other services
(email, shopping sites etc).

The obvious drawback to hiding the password is that it may be forgotten, but it
really isn't the SqueezeBox's place to act as a password store!
Comment 1 Blackketter Dean 2005-07-16 07:56:09 UTC
The other drawback is that entry and verification of the WPA password is complicated by not being able 
to see it.  I agree, relying on physical access to the player is probably not ideal, but we need to make 
sure that setup isn't made more difficult.
Comment 2 Jim McAtee 2005-07-16 13:48:59 UTC
No, you don't need to hide it while it's being entered, but you do whenever 
anyone returns to this area of the setup.  This won't make entering it any more 
difficult, but will probably make troubleshooting a bit harder.  If the SB is 
having trouble connecting to the wireless network, the only way to be sure that 
you have the correct key or password will be to return and reenter it.

An alternative approach would be to password protect this area of the setup, or 
perhaps this and other areas as well.  Other settings aren't as security-
sensitive, but it might be desirable to keep kids or visitors out of the setup 
altogether.  If this is done, then it's unnecessary to 'hide' the plaintext 
display of the wireless password since it's behind the setup password.  I'd 
have a default setup password, something like '1234', and then leave it up to 
the SB owner whether he wants to change it.

Comment 3 KDF 2005-08-10 21:35:03 UTC
I've seen some mention of a PIN or some kind of keyed password to enter setup. 
I think I prefer this as an overall solution rather than picking at each
element.  perhaps a kiosk mode (like the slimp3), that skips setup even on a
power_hold reset.  key code turns on and off, or password only on startup before
allowing access to setup. Only problem there, now you can't allow exposure of
that password, etc etc. There is always the occasional 'I've lost my http
password', and THAT is an easier one for the user to fix than something in flash.
Comment 4 Blackketter Dean 2005-09-07 15:06:03 UTC
Will address this post-6.2
Comment 5 Marc Auslander 2006-04-12 06:46:51 UTC
If you add a setup password you MUST provide a way out if its forgotten.

For example - full reset must work without the password and return the box to its original state, including the no password state.

And - its really better to start with no password.  Or in the alternative to display the default password value in the startup dialog.  People do loose their documentation.
Comment 6 Blackketter Dean 2006-04-12 07:25:41 UTC
Marc: see bug 3260 for password protecting setup.  We'll do asterisks to obscure the password when it's not locked (and fully set up).
Comment 7 Jim McAtee 2006-04-12 11:09:43 UTC
> We'll do asterisks to obscure the password when it's not locked (and fully set up).

Please do NOT do this.  It makes it virtually impossible to debug errors in the string.  I don't plan on using a lock code, but this change would require me to use one just to see the key in plaintext.  If someone chooses NOT to use a lock code then that's their decision to leave their wireless key exposed to remote ui users.
Comment 8 Richard Titmuss 2006-04-12 12:11:14 UTC
Jim, it's ok. The password remains in clear text until you have successfully connected to the slimserver. When the password is known to work, only then are asterisks used in place of the password.
Comment 9 Richard Titmuss 2006-04-18 12:06:11 UTC
Fixed in firmware 41