Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 20 Mar 2012 21:32:37 -0400
From: Rich Rumble <>
Subject: Re: Cracking Thunderbirds password database.

On Tue, Mar 20, 2012 at 4:59 PM, a <> wrote:
> I have managed to extract the encrypted user names and passwords from my
> Thunderbird database file, signons.sqlite and saved the data to a plain
> text file. I have eight lines, each with the user name and password, yet
> I have four email accounts. There is also the file, key3.db, which
> contains information about encryption for the passwords in signons.sqlite.
> However John states there are "No password hashes loaded (see FAQ)" for
> all files.
> Apparently the passwords in signons.sqlite are encoded by using base64
> and encrypted with 3DES and key3.db provides the decryption.
A PKCS-12 PBE With Sha1 and 3Des in CBC mode :)

> I am not sure how to tackle this problem.
This has been approached before here, but nothing came of it. These files
are encrypted with NSS found in the Mozilla Dev kit and in FF source.
I've been compiling information that pertains to this very task, but with focus
on FF as opposed to TB.
The previous thread about FF/signons.sqlite: (old version)
Firemaster does provide source:
Some additional code I've found:
"global salt" is important (naturally)
I've created a number of example files I'll post a link to in the morning.

Again I'm no programmer but I did a bit of research the last few weeks
into this issue and those are basically my notes :)

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ