https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Tech Services Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity, Equity & Inclusion
  • MSP 501
    • Back
    • MSP 501 Information Center
    • 2021 MSP 501 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2021 MSP 501
    • Circle of Excellence
    • DE&I 101
    • Top Gun 51
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Tech Services Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity, Equity & Inclusion
  • MSP 501
    • Back
    • MSP 501 Information Center
    • 2021 MSP 501 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2021 MSP 501
    • Circle of Excellence
    • DE&I 101
    • Top Gun 51
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Open Source


Ubuntu Linux WiFi Security: Canonical Combats Criticism

  • Written by Christopher Tozzi
  • December 30, 2013
Criticism of Ubuntu Linux for storing WiFi network passwords in plaintext is unfair, since Canonical doesn't develop NetworkManager.

It’s not even January 2014 yet, and already Canonical faces another media flare-up about its Ubuntu Linux operating system. But this time, the negative stories about the open source vendor — which critics accuse of storing WiFi passwords in an insecure way via NetworkManager — are not fair.

A few days ago, someone figured out that NetworkManager, the networking interface installed by default in Ubuntu and virtually every other major desktop Linux distribution, saves passwords for wireless networks in an unencrypted part of the file system. Now, the press is calling this “another potentially negative story about Ubuntu and Canonical,” and asking whether Ubuntu “goofed.”

To be sure, Canonical has made its share of poor PR decisions in recent years. From integrating Amazon.com search features into Ubuntu, to pushing drastically new interfaces into Ubuntu before they are ready for users (and users are ready for them), Canonical has sometimes displayed a tendency toward rash behavior — although it generally does a decent job of fixing its misteps sooner or later.

Don’t Blame Ubuntu

In this case, though, the password issue in NetworkManager is no fault of Canonical’s. The company doesn’t write that software; on the contrary, it’s part of GNOME, a project from which Ubuntu has grown increasingly distant in recent years. And there is no real alternative to NetworkManager, which is by far the most advanced and user-friendly networking interface available for Linux.

More importantly, the security concern with NetworkManager is not unique to Ubuntu. It affects all Linux distributions, as the media started noting after fingers were already pointing squarely at Canonical.

By the way, the fact that NetworkManager has been in widespread use on so many Linux platforms for over a half-decade, yet the password issue came to light only now, makes one wonder how crucially serious the vulnerability really is. Aren’t there much more important passwords to protect than those for wireless networks that users probably already know, since they’ve connected to the networks in the past? Sure, on multi-user systems, this information could be exploited in nasty ways, especially in enterprise settings where a particular user’s WPA password might also be used for other resources. But it’s hard to envision this being a huge problem for most users.

So on this occasion, Canonical deserves a break. There are plenty of valid criticisms of decisions made by the developers of Ubuntu — as of any operating system — but this is not one.

Tags: Agents Cloud Service Providers MSPs VARs/SIs Open Source

Most Recent


  • Virtual data center
    VMware vSphere Upgrade Supports AI Workloads On-Prem with Nvidia GPUs
    The new release makes way for virtualizing HPC servers running AI workloads.
  • Cyber attack
    Microsoft Cyberattack Continues Growing in Severity, Victims Racking Up
    Microsoft had almost two months to push out the patch it shipped on Mar. 2.
  • Important Announcement
    5 Key Announcements from Microsoft Ignite
    Password-less authentication, Azure Arc and simplifying edge development were among the popular topics.
  • Five, 5
    Top 5 Managed Services that Support Business Development
    MSPs can handle IT operations maintenance chores and free company resources for business development.

17 comments

  1. Avatar jimmy December 30, 2013 @ 6:26 pm
    Reply

    I think you missed the most
    I think you missed the most important point: there is no reasonable way to encrypt the password. It will either be in plaintext or force users to unlock it with common password for computer which is STUPID.

  2. Avatar Connie New December 30, 2013 @ 9:13 pm
    Reply

    The originator probably knew
    The originator probably knew that the flaw was not Ubuntu specific. It clearly helps someone to point a finger at Canonical…already a target for vilification for some Linux fans because of its many adventurous diversions (Unity, Mir etc), as well as the non-Linux users for whom Ubuntu IS Linux.

  3. Avatar AdamW December 30, 2013 @ 10:59 pm
    Reply

    Oh dear – you seem to be
    Oh dear – you seem to be trying to avoid the pitfalls the other press outlets fell into, but have found some of your own…

    Calling NM a part of GNOME could be slightly misleading: indeed its page is in gnome.org and it uses GNOME to host tarballs and bug reports, but it’s not really a GNOME-centric project, and its git repos are on freedesktop.org. I don’t know the history of why it has this split personality, but there ya go.

    There is a difference between distros here, even though a lot of distros use NM: distros can configure it differently. For instance, Fedora does not set things up so that wireless connections configured at the desktop by a user are systemwide connections by default, as Ubuntu does. You have to go and explicitly mark them as such.

    Still, I agree that this issue has been vastly overblown. In a lot of cases the media seems to be missing the rather important point that the file in question is owned by root and has 0600 permissions by default – i.e., only root can read it. Of course you can read it if you can boot the system and mount the relevant partition, but then there’s all _sorts_ of things you can read that way; distros do not generally ship in a configuration that is considered ‘safe’ against untrusted people with physical access to the computer, as it’s extremely difficult to do such a thing. If you require this level of security you should at a minimum be using full-disk encryption.

  4. Avatar Mark Hahn December 30, 2013 @ 11:27 pm
    Reply

    No break is deserved, because
    No break is deserved, because none is needed. Wifi passwords are not security, just a very mild access deterrent. Surely you know that you need to use https or ssh, right?

  5. Avatar Pp December 31, 2013 @ 2:34 am
    Reply

    I think that is indeed
    I think that is indeed Canonical’s fault since I have tried Fedora 20 with latest Gnome 3.10 and it stores Wifi passwords in Gnome keyring. Similarly in Arch + KDE kwallet is used to store passwords and moreover since 4.12 you can use GPG as back end for encrypting the passwords.
    So it seems that in Ubuntu they changed the default settings to keep passwords in plain text, instead of using any of the above mechanisms probably because of user friendliness (really?!) or they didn’t bother to integrate them with their offerings (like auto-unlocking gnome-keyring at logging in). But you can’t blaim NetworkManager for providing that option, but maybe they should consider removing it, since it gets abused by distributions like Ubuntu.

  6. Avatar Anonymous December 31, 2013 @ 8:48 am
    Reply

    Ad of course the file is only
    Ad of course the file is only readable by root.
    if an unauthorised person can log on a root then you have a far bigger concern that your wifi key being compromised.

  7. Avatar Anonymous December 31, 2013 @ 9:03 am
    Reply

    the files in which passwords
    the files in which passwords stored can be only be read by root !!!

    • Avatar Anonymous January 2, 2014 @ 9:55 pm
      Reply

      To get the key in plaintext
      To get the key in plaintext format, all you have to do is “steal” the computer for a moment, boot up with a live disk, and read the key. It will be even better if the computer was shutdown when you “stole” it. Nobody will guess that you “stole” it to steal the key.

      I am not an expert on this. However, for the more recent versions of Ubuntu, I think if you uncheck “Available for all users” — i.e., create connection only for the login account — for the network connection in NetworkManager, the key is stored in keyring encrypted. At least, for Ubuntu 12.04LTS, the connection settings in directory /etc/NetworkManager/system-connections does not have the key in plain text format.

      • Avatar freecode January 3, 2014 @ 1:06 pm
        Reply

        Of course, if you encrypt
        Of course, if you encrypt access to grub, and lock access to BIOS, all of the speculation is pointless drivel. Nice, but pointless. If, on the other hand, your whole OS is 777, well, you must be a novice running an insecure system.

  8. Avatar Anonymous December 31, 2013 @ 11:09 am
    Reply

    Christopher Tozzi if you like
    Christopher Tozzi if you like it or not Canonical is gulity here.

    You say they are using a part they don’t provide upstream support to. So why are they using it.

    Cannonical pulled their developers mostly out of Gnome.

    Sorry using it and not auditing it is an offense.

  9. Avatar Anonymous December 31, 2013 @ 11:52 am
    Reply

    when I walk away from my
    when I walk away from my desk-top I lock it, you are NOT getting Anywhere without my password,,,,my laptop I just close the lid,,,,,open it , you need a password. so what are the naysayers worried about?

  10. Avatar ricegf December 31, 2013 @ 1:32 pm
    Reply

    More to the point, only a
    More to the point, only a person with root access to a machine can see the password. If a hostile has root access on your machine, their ability to read your wifi password is the LEAST of your concerns!

    It’s simply a non-issue.

  11. Avatar matv1 December 31, 2013 @ 5:12 pm
    Reply

    This is a non issue. As
    This is a non issue. As stated in most of the comments below the original article, only someone who knows the root password could gain acces to this file.
    If you have a user inside your system that shouldnt have root acces but has it anyway, you have a very big -but totaly unrelated- problem.

  12. Avatar Mike Hibbert December 31, 2013 @ 8:31 pm
    Reply

    Unless I’m mistaken, those
    Unless I’m mistaken, those files cant be read without the root or sudo password anyway.

    If someone other than the proper user has those and can read the passwords then surely they already have root access to your system anyway?

  13. Avatar Anonymous January 2, 2014 @ 7:33 pm
    Reply

    Totaly bullshit.
    So they

    Totaly bullshit.

    So they don’t know they are using Gnome, they don’t know they are using NetworkManager, they don’t know they are forcing their user to use something with vulnerabilities inside.

  14. Avatar Anonymous January 2, 2014 @ 9:47 pm
    Reply

    I love Ubuntu! …and I
    I love Ubuntu! …and I don’t care!

  15. Avatar Anonymous January 4, 2014 @ 4:22 am
    Reply

    Linux is open source, Doesnt
    Linux is open source, Doesnt it?
    Just modify the code! Why not?

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • modern applications
    Making Modern Applications More Secure
  • Virtual data center
    3 Disruptive Networking Technologies Coming to Your Data Center
  • Risk level
    Cloud Security Provider Says Policy Gap Puts AWS Security at Risk
  • HPE Ezmeral
    HPE Ezmeral Updates Drive ‘Data-Driven Digital Transformation’

Upcoming Events

View all

Channel Partners Europe

June 14, 2022 - June 15, 2022

MSP Summit

September 13, 2022 - September 16, 2022

Galleries

View all

Partners Speak to Microsoft’s Rodney Clark Departure and New Requirements Controversy

May 18, 2022

The CF List: 2022’s 20 Top SD-WAN Providers You Should Know

May 18, 2022

Marketing All-Stars Share Their Focus for 2022 and Beyond

May 18, 2022

Industry Perspectives

View all

A Sneak Peek at the 2022 BrightCloud Threat Report

May 17, 2022

Build Customers for Life with CX and Lifecycle Selling

May 16, 2022

Voice Analytics Are a Must-Have as Companies Evolve COVID-Rushed Tech

May 12, 2022

Webinars

View all

Simplifying SaaS Security for MSPs

April 27, 2022

How to Supercharge The Network to Support Your IT Superhero Moves

May 3, 2022

The 2022 MSP Challenge: Scale Service Delivery Despite the Talent Gap

April 21, 2022

White Papers

View all

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

The AT&T Cybersecurity Incident Response Toolkit

April 4, 2022

Channel Futures TV

View all

AT&T, Microsoft, Cisco, ThreatLocker on Unlocking Partner Potential

Agents Share ‘Secrets,’ Industry Opportunity

May 11, 2022

Vonage Addresses Potential Partner Opportunity via Acquisition by Ericsson

May 5, 2022

Lumen Technologies ‘Built for Growth and Scale’

May 4, 2022

Twitter

ChannelFutures

.@threatx_inc rolls out first partner program. #APIprotection dlvr.it/SQd3Pd https://t.co/X6cvbgpijr

May 18, 2022
ChannelFutures

Our MSPs weigh in on @Microsoft's Rodney Clark’s sudden exit, and the shakeups and challenges the new NCE program h… twitter.com/i/web/status/1…

May 18, 2022
ChannelFutures

[email protected] now reaches 177 countries — 80 more regions for the channel to target. And #AWS has a new #publicsector… twitter.com/i/web/status/1…

May 18, 2022
ChannelFutures

Our CMO roundtable series concludes with members’ predictions on what their primary focus will be in the months ahe… twitter.com/i/web/status/1…

May 18, 2022
ChannelFutures

“@IngramMicroInc's role is to be the enabler of an ecosystem,” @SahooSanj said at the company's cloud summit.… twitter.com/i/web/status/1…

May 18, 2022
ChannelFutures

Take a sneak peak at BrightCloud's 2022 Threat Report. #Channel Partners #CyberThreats @Webroot… twitter.com/i/web/status/1…

May 18, 2022
ChannelFutures

#GoogleCloudSummit unveils new solutions for #zerotrust, supply chain security. @googlecloud dlvr.it/SQZ2By https://t.co/37buEDQ030

May 18, 2022
ChannelFutures

.@Veeam CEO @anandeswaran is gunning for outsized share of data protection market at #veeamOn2022… twitter.com/i/web/status/1…

May 18, 2022

MSSP Insider

Business advice for MSSPs and news from the broader security channel.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X