How safe are my files in /home?
This is a community wiki. I would really like other folk's thoughts on this. I do not want to discuss the ethics of storing plain text passwords either.
For those unfamiliar, libpurple is the library used by Pidgin, and when you choose to save your passwords, it does so as plain text under ~/.purple/accounts.xml
.
The reasoning behind this is that if someone can access your user account, you have bigger problems to worry about, among other valid points.
My main worry is that I use my gmail account in Pidgin, and so my gmail password is stored in plain text. Access to someone's email means access to 90% of their other accounts, via password recovery features on most sites. Eeek.
Consider that...
- My /home is encrypted, if someone gets physical access to the drive
- I always lock my system when I walk away
- I'm sensible about installing unofficial packages
- Any application I run in userland has access to my user files
How safe is this really? Are there any other threats that could potentially access accounts.xml?
Update
Thanks for the replies! So far have:
- Manage your firewall
- Use applications that store sensitive info securely (ie via Gnome Keyring)
- Use strong passwords and keep your system updated
- Symlink sensitive files from an encrypted ~/Private directory
I'm happy that my data is safe in case of theft. I'm more worried about some process crafted to target these unsecured files. Then again the nature of open source software makes it difficult for malicious apps, as public code review will expose the malicious code.
If you you can think of any other vectors through which these account details could be accessed, I'd like to hear them :)
For the most part if anyone has physical access to the machine security is null and void. As for "other users" if they are not trying to access the files and might just stumble into it just set the permissions on your home folder so no one else has any access except you.
As far as security over a network I find it hard to believe someone would get into your personal files unless you carelessly leave ports open. If you are concerned use Gufw to manage your firewall. You can also check from this website if you have security holes of some kind: https://www.grc.com/x/ne.dll?bh0bkyd2
Also you can read this security overview on the Ubuntu forums: http://ubuntuforums.org/showthread.php?t=510812
I hope this can be of help to you!
So your concern is application that store sensitive data in clear text. Here are a few suggestions:
- alternatives: try to find another application that does not store your data in clear text. Empathy can be substitute for Pidgin and store your credentials inside Gnome Keyring, which is a safe store and encrypted,
- strong password: You can't do much against physical access if the attacker thinks it can find higher values than what will cost him in time and resources cracking by brute force your encrypted hard disk. The stronger your password, the higher the chance the attacker will give up. Check Mozilla article + video about how to make strong password. And for your worry about your Gmail account, you can find Google solution to keep your account access secure.
- keeping up-to-date: there is always the risk of a security hole in one of your application that could give an attacker access to your disk. E.g. a hole in Flash that leave disk access open could give an attacker free access to plain text files.
I generally create an encrypted Private directory and move pidgin config and any other more dangerous information (.ssh, etc) into ~/Private. I then create symlinks for the directories in their original locations. To create an encrypted Private directory, use
ecryptfs-setup-private
You may need to install a package as well:
sudo apt-get install ecryptfs-utils
See the this for more details