You are right, but is so comfortable using the browser add-on!
Why you think the browser add-on is more vulnerable than standalone app?
I guess the main problem arises from the fact that you enter your credntials tenths time a day for using the password manager because when it reaches a timeout or close the browser is requires again the sign-in
that is a common way to get hacked.
i use firefox, the only addon is the mult-container, written by moziila.
as for passwords, i never save them with firefox, only keepass
keepass has a feature called auto-type, so i do not need to copy/paste passwords
and also, on android, use keepass.
yes, that is correct. no big deal, using auto-type with keepass.
for example, if i am looking at my browser, at the rclone forum login webpage.
i simply press a hotkey, that activates keepass to copy/paste the login info, including username, password and MFA token.
this is the auto-type sequence {USERNAME}{TAB}{PASSWORD}{ENTER}{delay 3000}{KPOTP}{ENTER}
currently I don't use browser password manager, but the chrome extension of bitwarden. It is very similar to the keepass.
Me too on bitwarden copy and paste. How about in your opinion the google password manager (passwords.google.com)? Sometimes I used it also...
I understand. I would like to understand which is the main reason why you consider Keepass more secure than Google passwords from a technical perspective.
And why you think using Keepass is a way to protect your information.In other words, why you think using Keepas keeps you away from any hacking issue?
I think the really important part is to ensure that your don't loose your important accounts in case someone should happen to compromise your password manager (whatever you use).
That is 2FA on all important accounts (especially the mail account linked to your other accounts) and then make sure the 2FA tokens are stored somewhere else - preferably another device.
Feel free to call me super paranoid, but this protects me even if one of my devices get compromised and somebody manages to snif my master password.
I do however tend to leave my rclone forum account logged in, so I am also into being comfortable
the internet is full of advice, not to trust google/chrome/addons/cloud with passwords, maybe read up on that.
and why keepass is to be trusted, tho nothing is 100%
What I realized now is that I had unfortunately S3 acces as root user as I did not generate a IAM user!
When I created the S3 bucket I did not investigate that much about the difference between IAM user and root user...
I guess in that way hacking the 2 AWS acces Key the user has the possibility to buy domains, change the reference email, add another credit card and so far, right?
So the hacking mechanism could have been that one.
AWS probably also have some measures in place that will block/throttle repeated unsuccessful attempts to log into an account.
My best guess is that one of your devices used to access Bitwarden or the AWS Management Console was compromised (and perhaps still is).
Edit: ...or someone got access to your email account and requested a password reset at AWS (I guess they send a confirmation email like everybody else).
then i ran rclone backend list-multipart-uploads remote: --s3-decompress --s3-disable-http2 --dump=auth,headers,bodies,requests,responses
and did see <Owner><ID>redacted</ID><DisplayName>redacted</DisplayName></Owner>
those links are for STS, which my scripts uses as all users have MFA enabled.
rclone itself cannot create the STS token.
as this point, i am done testing, learned what i needed to.
in practice, this topic should not apply when using this setup, as i do.
--- set account name to dummy value.
--- never login using root
--- never store root login info using password manager
--- never create access.keys for root
--- force MFA login for root user.
--- force MFA login for all IAM user.
with this enabled, rclone, own its own, cannot perform any operations.
have to use customs scripts to create a temporary MFA token, use that MFA token to create a temporary STS token and then feed that STS token to rclone using --s3-session-token
Sorry,
I enabled the rclone.config encryption, but now, of course when I try to use my original scripts for rclone they fail because rclone.config is encrypted.
I read the wiki https://rclone.org/docs/#configuration-encryption but really it is not very clear to me how I can manage rclone to run with the crypted rclone.config file.
The wiki tals about a paswordstore tools which is not available in my asuswrt system (I have a Asus RTAX88U router) nor in entware distribution.
Can you help me to understand how to run the rclone script with encrypte rclone.config file?
The answer heavily depends on your current situation and objective.
How do you think your AWS credentials was stolen?
Have you eliminated all hidden backdoors established by the attacker into your email and/or compromised devices? How?
Do you consider your router to be a safe environment?
What kind of attack are you trying to protect against?
What version of rclone are you using? Please post the output from rclone version
What have you tried?
Sorry Ole,
my question was related on how to use rclone in my script after have encrypted the rclone config file.
Anyway I also respond to your questions:
My best guess is that username is easy to be found because is an email address used in many situation. The same email address is used for example for bitwarden. Password may be found with brute force attack starting from similar passwords they may have hacked on one of many websites where I registered using the same email
As I told you before I have no evidence of any violations on email or other devices. Anyway, to be sure I added a 2FA on bitwarden and changed all the relevant passwords stored to random ones.
Looking to the router logs I don't see any intrusion to my router. In any case I changed the password, disabled the VPN running on router, encrypt the rclone config file
I have no evidence of any attack
please see the starting point of this thread for this information