I’m a huge fan of 1Password, I use it daily and recommend it to everyone. When I found out that the new version of 1Password for Mac OS Xshipped today, I was very excited to try it out. (Though I’m an avid user of beta software, I would never use a beta for so critical a function.)
As a bit of a security geek, I review the core security tools I use for correctness from a design perspective (and implementation, where possible.) It’s important to me that I fully understand how these tools work because I handle and share sensitive information in my line of work. Hence, before I downloaded and installed version 4 of 1Password, I did a full review of their excellent architecture documentation. I can give the new version a clean bill of health: indeed, it’s even slightly more secure than the previous version. I recommend 1Password version 4 to users looking for a password management solution, and recommend that existing users upgrade. However, I do have one caveat that I must add to my recommendation: Do not use the item sharing feature to share sensitive information, including but not limited to passwords and credit cards. It should not be considered secure. To be clear, I’m not talking about the ability to have a secondary shared vault - this is fine, and I plan to set up a “household” vault to share with my wife this weekend for our shared accounts and data. It’s the sharing of individual items via iMessage or email that I have issues with.
Everything else about the product is rock solid, the other new features are excellent. The design and user experience improvements are significant. I want to be clear that I still recommend the product, and definitely recommend that existing users upgrade. I’m simply saying that you** shouldn’t use item sharing until AgileBits rearchitects that feature. **
AgileBits does a fantastic job of documenting their security architecture, and the mechanisms used to store and encrypt/decrypt your sensitive data. They get into the nitty gritty details of their key derivation routines, password brute force countermeasures, and other technical information necessary to assess the security of the product. I really appreciate this, as without this level of detail I would not be able to use the product. They have a high-level security summary, a version 4 delta summary, and a more detailed document available for your perusal.
Even though they provide reams of documentation, most of what you need to know they summarize in a few short sentences:
The short answer is 1Password uses the best available encryption from well trusted and scrutinized cryptographic libraries. It is designed in accordance with the recommendations of the cryptographic research community. It is designed so that if anyone (including us) were to get a hold of your 1Password data there is no feasible way for them to decrypt your secrets without knowing your Master Password. We’ve even designed 1Password to make things extra difficult for systems that might try guessing your Master Password.
1Password 4’s Cloud Keychain format uses Encrypt-then-MAC for authenticated encryption with AES-CBC-256 for encryption and HMAC-SHA256 for Message Authentication. Key derivation uses PBKDF2-HMAC-SHA512. On Mac and iOS 1Password uses
SecRandomCopyBytes()from Apple’s security framework.
These summaries, and the more detailed documentation, are clear and well-written. They did a fantastic job of answering my questions… except after reading and re-reading all of the materials on their site, I still couldn’t answer the question of how the new item sharing feature worked; or, more to the point, how it secured the information that was being shared. The omission was even more striking because the documentation is otherwise so complete.
After a bit of searching around, I was able to find a (somewhat) old blog post on the AgileBits blog that discussed the sharing feature from the iOS release of version 4 released in May. This post makes it clear that the security of the item sharing feature is dependent on the security of the channel on which the data is being shared. Indeed, it’s even described as “not human readable” but that anyone with a copy of 1Password could access the data being shared (for example, the password or credit card number) if they intercepted the message. This caused me to look at what’s being shared, and it’s pretty clear that it’s obfuscated, not encrypted… indeed, it’s pretty weakly obfuscated. (If I have time this weekend, I may update this post to include more information on the shared item format.) The sharing feature allows you to share over two channels: iMessage, and e-mail.
Now iMessage is arguably a reasonably secure channel, at least based on what we know about it. Apple doesn’t disclose every last detail like AgileBits does, but what we know about iMessage indicates that it’s reasonably secure. However, there’s a big difference between “reasonably secure” and “secure.” It’s unlikely given what’s known about the protocol that a malicious user could intercept iMessages, and equally unlikely that a man-in-the-middle attack would be viable. However, there are strong indications that Apple themselves could gain access to the data (meaning it would be potentially susceptible to a warrant or NSL) and the messages are also stored on your phone and in your backups, which may or may not be encrypted based on your settings. So one could argue that sending this information in an essentially unprotected format via iMessage is reasonable. I would disagree with that person, but I wouldn’t think they were insane. My advice would be not to send anything you consider truly sensitive via iMessage.
However, there’s absolutely no justification for enabling this feature over email. This is inarguably a mistake, and one that the security folks at AgileBits should not have allowed to happen. The fact that 1Password even allows this gives the user a false sense of security, and makes people likely to assume it’s secure. Indeed, even [fairly advanced users have indicated that they would be willing to use the feature] based on their inherent trust of AgileBits. The feature should, at minimum, pop up a warning indicating that this is not a good thing to do with sensitive information. Allowing users to send credit card numbers and passwords in an unprotected form like this is inappropriate, and I’m disappointed in AgileBits for enabling the feature.
Indeed, I would prefer that it literally be sent in the clear (which is an option– but at least when doing that you know that you’re doing it.) Users would KNOW it was being sent in the clear. Because of the generally opaque format, items shared in this fashion SEEM secure, and the user is understandably going to assume that to be the case in absence of a warning.
AgileBits needs to rearchitect this feature. Every 1Password user has an account with AgileBits… so why not generate an asynchronous key pair on the device and upload the public key to AgileBits’ cloud? Then they could facilitate truly secure exchanges of items between users. Since the shared items can only be opened with 1Password anyway, lack of such an account isn’t a blocker. Obviously, there could be something preventing them from implementing this in the way I’m describing - at minimum I’m oversimplifying the problem… but if they can’t actually fix it and architect it in a secure manner they need to remove the feature. If they are unwilling to remove the feature, they need to at least pop up a warning indicating to the user that the feature should not be used with sensitive information (which is the only thing you’re storing in 1Password) especially when the user chooses to send the data via email. I think they should remove it (or at least remove email sharing.) Too many people will use it to send passwords and credit card info via email otherwise.
It’s a fantastic product with one broken feature… but a feature this poorly conceived reduces trust in the vendor’s judgement and commitment to secure implementations.
Again, I still strongly recommend the product as long as you avoid the item sharing feature.