On the Mac, you can easily access your safe from within your browser.
To launch this feature, we selected the Safari web browser, but more will likely come soon.
Apple's built-in web browser is currently supported on OS X El Capitan (10.11) and newer.
To install the extension:
- On El Capitan, you need to get it from the Extension Gallery.
- On Yosemite, download the extension by clicking on the Safari icon above and then follow the authentication procedure below.
After installing your browser extension, you'll be asked to authenticate the communication between it and the pwSafe app. It's a simple process, just verify that the authentication code displayed by the extension inside your browser and by pwSafe match one another and click “Authorize” on both the app and the extension.
Understand why this is necessary on the security section below.
To use the extension, navigate to a page which has passwords fields and click the pwSafe icon on the browser's toolbar. You can also hit CMD + Option + P, unless the website is actively disabling hotkeys.
Tip: experiment with the arrow keys and return key to use the extension without touching the mouse most of the time.
If your safe is not already unlocked, you'll have to choose it, and then enter its password so that pwSafe can unlock it. You can do all that using just the keyboard: use the arrow keys to move up or down and the enter key to select your safe from the list. After you've input your password, press the return key to unlock your safe.
To defend against malicious websites:
- The full list of passwords is never sent to the extension, which only gets the password needed to fill the currently displayed webpage. When listing entries, it only gets titles, details (username and url) and groups.
- Extensions are broken in two main components: one running inside the displayed webpages (more vulnerable) and another one running in an isolated context (more secure). The component which runs on the webpage context can't connect to pwSafe directly, so it can't send commands to it asking for more passwords. It can only report which fields are present on the webpage and, when ordered to, fill them with the provided values.
To defend against malicious apps on your Mac:
- Communications between the extensions and pwSafe are run over a standard HTTP Websocket connection to localhost. Since the SSL certificate validation logic cannot be overridden by the extension, we use a non-encrypted HTTP connection with our own security (encryption and authentication) layer on top.
- Everything but the handshake is fully encrypted (AES-CBC-256) and authenticated (HMAC-SHA-256).
- When you first connect, both sides calculate an identifier which is a hash of both parties' public keys (RSA-2048) and display it to the user. The user then matches both, defending against man in the middle attacks.
- After validation, the extension and pwSafe save the other party's public key and verify it on every new connection, closing it if it changed, preventing man-in-the-middle attacks.
- On every session, new encryption and authentication keys are generated, so as to guarantee perfect forward secrecy (PFS).
- Session keys depend on both sides random number generators, making it harder to exploit a PRNG fault.
- Every data packet has:
When designing the extensions, we took great care to protect your passwords at all times, but you are welcome to examine the extensions source-code at any time. If you happen to find any problem we missed, please report it back to us, so that we can fix it as soon as possible.
The source code is not obscured or minified in any form, just unpack the extension and examine it at will. Please mind the code is fully copyrighted and that you are not supposed to reuse it in any form, you are granted a license just to find possible security issues in it.
If we failed to address any concern, please let us know.