Skip to content

Evaluation of LessPass security #2

@dbosk

Description

@dbosk

LessPass is a stateless password manager which does not require any storage of the passwords. This is good for usability.

On the other hand, the "something to have" (i.e. the encrypted password database) is removed. Thus anyone can attack this system. Consider the following scenario: Alice signs up for a service which doesn't encrypt passwords, the password database leaks. This password (and site and login) provides a "witness" to knowing the master password for LessPass. Once the master password is verified using the leaked password, any other password is also broken.

So the question is, how difficult is this attack? LessPass uses PBKDF2 with 100 000 iterations and SHA-256. This function is supposedly secure, but how secure must the master password be to withstand differently equipped attackers?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions