LastPass Password Manager

From Wikipedia, the free encyclopedia - View original article

LastPass Password Manager
Lastpasslogo.png
Developer(s)LastPass
Initial releaseAugust 22, 2008 (2008-08-22)
Stable release3.0.17 / November 27, 2013; 19 days ago (2013-11-27)
Operating systemCross-platform
Available inMultilingual
TypePassword manager
LicenseProprietary software
Websitelastpass.com
 
  (Redirected from LastPass)
Jump to: navigation, search
LastPass Password Manager
Lastpasslogo.png
Developer(s)LastPass
Initial releaseAugust 22, 2008 (2008-08-22)
Stable release3.0.17 / November 27, 2013; 19 days ago (2013-11-27)
Operating systemCross-platform
Available inMultilingual
TypePassword manager
LicenseProprietary software
Websitelastpass.com

LastPass Password Manager is a freemium password management service developed by LastPass. It is available as a plugin for Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and Safari. There is also a LastPass Password Manager bookmarklet for other browsers.

LastPass seeks to resolve the password fatigue problem by centralising user password management in the cloud.

Overview[edit]

Passwords in LastPass Password Manager are protected by a master password and are encrypted locally and are synchronized to any other browser. LastPass Password Manager also has a form filler that automates password entering and form filling. It also supports password generation, site sharing and site logging.

On December 2, 2010, it was announced that LastPass acquired the bookmark synchronizer Xmarks.[1] LastPass password management technology was integrated into the “Identity and Privacy” feature of Internet security company Webroot’s newest security suite. Full terms of the licensing deal were not disclosed.[2]

Features[edit]

Source code[edit]

LastPass Password Manager is closed source, though many of the extensions can be run in a non-binary mode where the source is available, but LastPass maintains all rights.

One of the developers of LastPass Password Manager, Sameer, has argued that, theoretically, the integrity of the software could be verified without making it open source, and mentioned that the developers may be open to the future possibility of making the user interface of LastPass Password Manager open source.[5]

Reception[edit]

In March 2009, PC Magazine awarded LastPass Password Manager their "Editors' Choice" for password management.[6] LastPass Password Manager has a rating of 4 out of 5 stars at the Firefox Add-ons web site with over 900 reviews,[7] and it has been featured on Download Squad,[8] Lifehacker,[9] and MakeUseOf.[10]

In July 2010, LastPass Password Manager's security model was extensively covered and approved of by Steve Gibson in his Security Now podcast episode 256.[11]

Security breach[edit]

On Tuesday, May 3, 2011, LastPass discovered an anomaly in their incoming network traffic, and then another, similar anomaly in their outgoing traffic.[12] Administrators found none of the hallmarks of a classic security breach (for example, database logs showed no evidence of a non-administrator user being elevated to administrator privileges), but neither could they determine the root cause of the anomalies. Furthermore, given the size of the anomalies, it is theoretically possible that data such as email addresses, the server salt, and the salted password hashes were copied from the LastPass database. To address the situation, LastPass decommissioned the "breached" servers so they could be rebuilt, and on May 4, 2011, they requested all users to change their master password. However, the resulting user traffic overwhelmed the login servers and, temporarily, administrators were asking users to refrain from changing their password until further notice, having judged that the possibility of the passwords themselves being compromised to be trivially small. LastPass also stated that while there was no direct evidence any customer information was directly compromised, they preferred to err on the side of caution.[13] There have been no verified reports of customer data loss or password leaks since these precautions were taken. In comment 6, Joe Siegrist committed to a third-party audit, saying one "is certainly prudent". However, no audit results have been published to date.

XSS vulnerability[edit]

In February 2011, a Cross Site Scripting (XSS) security hole was discovered, reported by security researcher Mike Cardwell, and closed within hours.[14] It was mild enough to be considered low risk, and a log search showed no evidence of exploitation (other than by Cardwell). However in addition to closing the hole, LastPass took additional steps to further improve security, including implementing HTTP Strict Transport Security (HSTS), as Cardwell had suggested, implementing X-Frame-Options, and a Content Security Policy-like system in order to provide defense in depth.[14][15]

See also[edit]

References[edit]

External links[edit]