LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 07-17-2015, 08:19 AM   #1
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Rep: Reputation: 11
Post Can Pidgin Messenger Encrypt my Password?


Hello.
I have a question about Using Pidgin. When I use Pidgin for open my Gtalk or... Can Pidgin Encrypt my Username and Password or it transfer them in clear text ? Can Third person sniff my password?
What is your idea?

Thank you.
 
Old 07-17-2015, 06:46 PM   #2
mralk3
Slackware Contributor
 
Registered: May 2015
Distribution: Slackware
Posts: 1,900

Rep: Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050
This question is easily answered by searching "how does pidgin store user credentials?" in a search engine.
Quote:
Quoted From: https://developer.pidgin.im/wiki/PlainTextPasswords
Purple does not now and is not likely to encrypt the passwords in the accounts.xml file, nor is it likely to be encrypted in a future release.
The best way to store your password in Pidgin, is to not store it. Rather enter it each time your log into your account(s) by unchecking "save password" in each account page settings.
 
Old 07-17-2015, 07:17 PM   #3
Sefyir
Member
 
Registered: Mar 2015
Distribution: Linux Mint
Posts: 634

Rep: Reputation: 316Reputation: 316Reputation: 316Reputation: 316
Is OP worried about credentials being stolen in transmission during logging in or during storage?
There really isn't a risk with storing passwords plaintext as long as no one else has physical access that you don't trust.
During normal usage, permissions of 600 is enough.

If you suspect that it is possible that someone will attempt to gain physical access and access files, you should consider full disk encryption. This would solve the problem of plain text passwords anyways.
 
Old 07-17-2015, 07:31 PM   #4
mralk3
Slackware Contributor
 
Registered: May 2015
Distribution: Slackware
Posts: 1,900

Rep: Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050
He is worried about how the user credentials are being stored from what I can tell.

Quote:
Originally Posted by Sefyir View Post
Is OP worried about credentials being stolen in transmission during logging in or during storage?
There really isn't a risk with storing passwords plaintext as long as no one else has physical access that you don't trust.
During normal usage, permissions of 600 is enough.

If you suspect that it is possible that someone will attempt to gain physical access and access files, you should consider full disk encryption. This would solve the problem of plain text passwords anyways.

Full disk encryption only works if the machine is powered off. If you are booted up, the disks have to be decrypted.
 
Old 07-17-2015, 07:37 PM   #5
Sefyir
Member
 
Registered: Mar 2015
Distribution: Linux Mint
Posts: 634

Rep: Reputation: 316Reputation: 316Reputation: 316Reputation: 316
Quote:
Originally Posted by mralk3 View Post
He is worried about how the user credentials are being stored from what I can tell.




Full disk encryption only works if the machine is powered off. If you are booted up, the disks have to be decrypted.
Correct. If the computer is powered up, my assumption is the someone who can unlock them is also a trusted person of that computer.
Otherwise, a "untrusted" person will have no access or ability to "override" permissions. My example is with windows, I can access any file in a reboot by live booting. Full disk encryption would prevent that.

The reason I'm not sure is this:

Quote:
Can Pidgin Encrypt my Username and Password or it transfer them in clear text ? Can Third person sniff my password?
Hopefully the OP can clarify.
 
Old 07-18-2015, 12:46 AM   #6
mralk3
Slackware Contributor
 
Registered: May 2015
Distribution: Slackware
Posts: 1,900

Rep: Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050
Some of my information may be incomplete, as I am very tired and about to head to bed.

Quote:
Originally Posted by hack3rcon View Post
Can Third person sniff my password?
Yes, a man in the middle attack is possible. It is possible to use a packet sniffer and a ssl stripper to decrypt and display encrypted passwords. It is also definitely possible to view entire SSL encrypted conversations on any network using this same method.

The easiest man in the middle attack to carry out is an ARP poisoning attack on a local area network. Another such attack uses DNS poisoning to redirect a victim to the attacker, where the attacker then forwards traffic to its originally intended destination, after it has been decrypted.

The strength of the SSL encryption does not play a role in preventing such an attack since the traffic being intercepted is effectively being rerouted on the attacker's machine. The act of rerouting the traffic on the local host, allows the attacker full access to manipulating the SSL session.

On the internet, the best way to circumvent this is to use trusted networks, assure openssl is up to date, and that you are not a victim of DNS poisoning either. The only way to circumvent ARP poisoning is to force static ARP tables on all hosts on your LAN so that the router is never confused about who is who on the network. By "use trusted networks", I mean that you should not log onto google talk (or any other sensitive service) on a public or untrusted network, untrusted VPN, over Tor, or using public proxies.

Apart from that information, I really do not feel comfortable sharing what software tools are used to carry out such an attack on a public forum. A quick google will tell you how it's done; the information is not hard to find.
 
Old 07-18-2015, 12:49 AM   #7
mralk3
Slackware Contributor
 
Registered: May 2015
Distribution: Slackware
Posts: 1,900

Rep: Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050
Quote:
Originally Posted by hack3rcon View Post
Can Pidgin Encrypt my Username and Password or it transfer them in clear text ?

Pidgin does not transfer your password in clear text if you force Pidgin to use SSL. In fact, I believe Google Talk will not allow you to log in unless you use secure settings, such as SSL.

Please see: https://support.google.com/a/answer/49147?hl=en
 
Old 07-18-2015, 02:12 PM   #8
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
I mean is that if I enter my password for login to Gtalk via Pidgin, The pidgin transfer my password for check by google in clear text or not?
 
Old 07-18-2015, 02:13 PM   #9
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Quote:
Originally Posted by mralk3 View Post
Some of my information may be incomplete, as I am very tired and about to head to bed.



Yes, a man in the middle attack is possible. It is possible to use a packet sniffer and a ssl stripper to decrypt and display encrypted passwords. It is also definitely possible to view entire SSL encrypted conversations on any network using this same method.

The easiest man in the middle attack to carry out is an ARP poisoning attack on a local area network. Another such attack uses DNS poisoning to redirect a victim to the attacker, where the attacker then forwards traffic to its originally intended destination, after it has been decrypted.

The strength of the SSL encryption does not play a role in preventing such an attack since the traffic being intercepted is effectively being rerouted on the attacker's machine. The act of rerouting the traffic on the local host, allows the attacker full access to manipulating the SSL session.

On the internet, the best way to circumvent this is to use trusted networks, assure openssl is up to date, and that you are not a victim of DNS poisoning either. The only way to circumvent ARP poisoning is to force static ARP tables on all hosts on your LAN so that the router is never confused about who is who on the network. By "use trusted networks", I mean that you should not log onto google talk (or any other sensitive service) on a public or untrusted network, untrusted VPN, over Tor, or using public proxies.

Apart from that information, I really do not feel comfortable sharing what software tools are used to carry out such an attack on a public forum. A quick google will tell you how it's done; the information is not hard to find.
Are you agree with Tor?
 
Old 07-18-2015, 02:39 PM   #10
mralk3
Slackware Contributor
 
Registered: May 2015
Distribution: Slackware
Posts: 1,900

Rep: Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050
Can Pidgin Messenger Encrypt my Password?

Quote:
Are you agree with Tor?
I do not understand what you mean by this.
 
Old 07-20-2015, 07:09 AM   #11
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
I mean is that If I configure Pidgin for using Tor, Can third Person hijack my password?
 
Old 07-20-2015, 08:50 AM   #12
mralk3
Slackware Contributor
 
Registered: May 2015
Distribution: Slackware
Posts: 1,900

Rep: Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050
Quote:
Originally Posted by hack3rcon View Post
I mean is that If I configure Pidgin for using Tor, Can third Person hijack my password?
Tor is not meant to increase security. Tor is mean to increase anonymity.

If you enable 2 factor authentication in your Google account and use app passwords, it will add an extra layer of security to your account. 2 factor authentication will not prevent your communications from being intercepted (possible decrypted) while it (can possibly) passes through tor exit nodes that are issuing a MITM attack. It is never a good idea to use network services on networks that are unstrusted, such as Tor.

Tor is meant to anonymize it's users. Using an account that easily identifies you, like google talk, is pointless since it defeats the purpose of Tor.

If you want to use a proxy for google talk, your best bet is to set up your own VPN using a virtual private server or a dedicated server. Though this still does not fully secure your communications, since the chat session still needs to make it's way across the internet to Google's servers.

If you are that worried about user credentials or communications being intercepted, you should set up your own jabber service (or IRC service) on a server you control. Then allow your friends to connect to it over a VPN that runs on this same server. This is the most secure way to use instant messaging services, and will have the highest security (if set up correctly) in securing your communications, as well as user credentials. This method is also far more anonymizing since you control the chat server logs, who accesses it, its level of security, its level of encryption, and nothing goes over the internet.
 
Old 07-21-2015, 02:45 AM   #13
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
I just want to know when I enter my password in Pidgin, The pidgin encrypt it on my PC and the send it to google or send it as clear text to google.
 
Old 07-21-2015, 11:02 AM   #14
mralk3
Slackware Contributor
 
Registered: May 2015
Distribution: Slackware
Posts: 1,900

Rep: Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050Reputation: 1050
Quote:
Originally Posted by hack3rcon View Post
I just want to know when I enter my password in Pidgin, The pidgin encrypt it on my PC and the send it to google or send it as clear text to google.
I've answered this several different ways. I will simplify.

Yes.
 
Old 07-22-2015, 03:22 AM   #15
hack3rcon
Senior Member
 
Registered: Jan 2015
Posts: 1,432

Original Poster
Rep: Reputation: 11
Thank you.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Pidgin: Unable to RSA encrypt the password (opensteamworks) pusrob Linux - Software 0 04-17-2015 03:44 PM
crypt() perl function to encrypt Password in shell scripts or How Encrypt passwords ? balakrishnay Linux - General 13 01-14-2010 09:35 AM
Pidgin Messenger problem PCLinux7094 Linux - Software 28 08-30-2009 04:44 PM
yahoo messenger server in pidgin lumak Linux - Software 6 06-22-2009 07:28 AM
How do I use pidgin for yahoo messenger? walterbyrd Linux - Software 1 02-11-2009 02:48 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:34 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration