I'd quite like to see Apple's Passwords app subjected to the same sort of analysis, since it also has a 'share passwords with family' feature.One of the attacks targeting Bitwarden key escrow is performed during the enrollment of a new member of a family or organization
I just want to note that using Syncthing to sync a KeePass database can be done "serverless". Even if I do personally run Syncthing on my home server, you could simply run it on three or four devices and have a decent amount of data safety. If I took my home server out of the mix my password databases would still be on four devices.I'm tired of the posts promoting how keepass avoids cloud vulnerabilities. Yes it does.
But many of us want the features that having a vault in the cloud provides. And many (most?) of us don't want to or don't have the expertise to make our own NAS based internet vault server, LoL.
Heck, if I just memorize all my passwords, and that will be perfectly secure too!
At some point, the attacker can just use the $5 wrench attack.
https://imgs.xkcd.com/comics/security.png
Or even if you have the expertise to do it. Do you really have the expertise and time needed to make sure it's actually secure through time? How do you know if a zero-day is found in Syncthing, or Keepass? Or even have the bandwidth or understanding needed to properly monitor a system for intrusion? The CLI isn't where most people can reasonably spend their lives.I'm tired of the posts promoting how keepass avoids cloud vulnerabilities. Yes it does.
But many of us want the features that having a vault in the cloud provides. And many (most?) of us don't want to or don't have the expertise to make our own NAS based internet vault server, LoL.
Heck, if I just memorize all my passwords, and that will be perfectly secure too!
At some point, the attacker can just use the $5 wrench attack.
https://imgs.xkcd.com/comics/security.png
There's a big difference between a breach at a cloud provider and an exploit that requires access to an individual's device. Neither KeePass nor Syncthing require any CLI usage.Or even if you have the expertise to do it. Do you really have the expertise and time needed to make sure it's actually secure through time? How do you know if a zero-day is found in Syncthing, or Keepass? Or even have the bandwidth or understanding needed to properly monitor a system for intrusion? The CLI isn't where most people can reasonably spend their lives.
The only one they were at liberty to name was 1Password. Almost all the password managers, they added, are vulnerable to the attacks only when certain features are enabled.
I understand the concerns but the burden of entry is pretty darn low. At least in windows there is no CLI at all involved in settings up Syncthing or KeePass.Or even if you have the expertise to do it. Do you really have the expertise and time needed to make sure it's actually secure through time? How do you know if a zero-day is found in Syncthing, or Keepass? Or even have the bandwidth or understanding needed to properly monitor a system for intrusion? The CLI isn't where most people can reasonably spend their lives.
So then like… what’s the follow up? I feel like password managers are still more secure than not using one. Do we just continue using them knowing they are flawed and be careful?
This seems really bad
Should that be 300,000-fold decrease?Still other attacks against all three password managers allow adversaries to greatly reduce the selected number of hashing iterations—in the case of Bitwarden and LastPass, from a default of 600,000 to 2. Repeated hashing of master passwords makes them significantly harder to crack in the event of a server breach that allows theft of the hash. For all three password managers, the server sends the specified iteration count to the client, with no mechanism to ensure it meets the default number. The result is that the adversary receives a 200,000-fold increase in the time and resources required to crack the hash and obtain the user’s master password.
I just want to note that using Syncthing to sync a KeePass database can be done "serverless". Even if I do personally run Syncthing on my home server, you could simply run it on three or four devices and have a decent amount of data safety. If I took my home server out of the mix my password databases would still be on four devices.
I've been around more than half a dozen decades and there's one thing I learned a very long time ago: Whatever can be thought up by man, can be undone by man.The definitions vary slightly from vendor to vendor, but they generally boil down to one bold assurance: that there is no way for malicious insiders or hackers who manage to compromise the cloud infrastructure to steal vaults or data stored in them.
I get that it can be annoying. It’s just, for some reason articles like this one call “Cloud Password Managers” “Password Managers.” So, keepass users probably feel the need to point out that this isn’t a problem with Password Managers, it is a problem with Cloud. Complain to the author, not the commenters with the valid and obvious correction.I'm tired of the posts promoting how keepass avoids cloud vulnerabilities. Yes it does.
But many of us want the features that having a vault in the cloud provides. And many (most?) of us don't want to or don't have the expertise to make our own NAS based internet vault server, LoL.
This doesn’t seem fair. Most people can’t memorize enough high quality passwords to make this a practical option.Heck, if I just memorize all my passwords, and that will be perfectly secure too!
The wrench attack might work. But it has the downside of being easily detectable.At some point, the attacker can just use the $5 wrench attack.
https://imgs.xkcd.com/comics/security.png
Literally came here to post the same question.I’m confused by this sentence about 1Password. What’s is it trying to say? That they didn’t analyze it but it would be subject to the same attacks? I feel like a sentence is missing.
Maybe I’m just not getting something obvious.
Firstly, Syncthing just synchronises files. A zero day isn't going to somehow give it access to your keypass master password or somehow decrypt your password db file.Or even if you have the expertise to do it. Do you really have the expertise and time needed to make sure it's actually secure through time? How do you know if a zero-day is found in Syncthing, or Keepass? Or even have the bandwidth or understanding needed to properly monitor a system for intrusion? The CLI isn't where most people can reasonably spend their lives.
I use a 4096-bit hardware-random-number-generator for onetime-use passwords that I pipe immediately to /dev/null.So when I hear "No way to...", I'm pretty sure there's not only A way to, there are probably several ways to. Even with the best intentions on the planet, you can't possibly defeat all of the Dave's standing in the way between you and cybersecurity nirvana...
There's a big difference between a breach at a cloud provider and an exploit that requires access to an individual's device. Neither KeePass nor Syncthing require any CLI usage.
Exact same setup, has been pretty solid for years for 5 people. Since I have a mixed OS homestead I have to support IOS which I do via mobious sync- it tries hard but IOS limitations can make it a bit less likely to stay in sync with out some nudging. I do like like keepassium for keepass file support in IOS and is wife approved for ease of use.When I finally recognized my need to set up a password manager and set new, unique passwords for all our important accounts, I chose KeePassDX/KeePassXC and Syncthing(-Fork) to share a password database with my wife. The bonus is that I ended up using Syncthing for a bunch of other stuff and it's made my life better in a number of ways. I have full control over where our password databases are stored, and they're synced instantly across several devices that are not controlled by any cloud service.
EDIT: I recognize that's not always the best solution for a larger team, but even then I highly recommend people consider FOSS server options like Vaultwarden.
This is one of those terms that always amuses me. FIPS, the Federal Information Protection Standard, has profiles for common ciphers including AES. AES is the default cipher for just about everything and even has hardware acceleration in processors from the past decade or so. In no way does this differ from normal encryption practices.military-grade encryption
This makes absolutely no cryptographic sense. CBC is the de fact ostandard chaining mode for block ciphers and AES-CBC is everywhere. There is absolutely nothing wrong with CBC.The modification causes the use of CBC (cipher block chaining), a form of encryption that’s vulnerable to several attacks.
If you really want to make KeePass DBs secure, you need to use a YubiKey (or similar) HSK with them, and increase the strength of the KPDB security above that of the default.When I finally recognized my need to set up a password manager and set new, unique passwords for all our important accounts, I chose KeePassDX/KeePassXC and Syncthing(-Fork) to share a password database with my wife. The bonus is that I ended up using Syncthing for a bunch of other stuff and it's made my life better in a number of ways. I have full control over where our password databases are stored, and they're synced instantly across several devices that are not controlled by any cloud service.
EDIT: I recognize that's not always the best solution for a larger team, but even then I highly recommend people consider FOSS server options like Vaultwarden.
100%. When they did that is when I stopped using their product and switched to a different local only password manager. No fucking shot will I put my passwords on any server, anywhere, regardless of encryption tech or promises.This is exactly the sort of development I feared when 1Password announced they were doing away with local vaults.
Was disappointed when I looked for the coincidentally named researcher named Nic Cage in the article, to go with your joke, only to find there was none.I was kind of hoping to read how the process involved lead researcher Nic Cage who had followed a number of clues leading to the next step in the penetration of the vaults that spanned multiple cities in multiple states to peel away the layers to get to the ultimate vault of passwords.
Isn’t it just Keychain?100%. When they did that is when I stopped using their product and switched to a different local only password manager. No fucking shot will I put my passwords on any server, anywhere, regardless of encryption tech or promises.
One or two people have mentioned Apple's Passwords app. IMO it's way too new a product to mess with, even on the level of simple things like accurate import/export to other trusted apps. Maybe in 3 or 4 years after they've hopefully fleshed out its capabilities and workflow some, I'll try it... but only if it's local. Any sort of forced iCloud BS and it'll continue to sit empty.
I've been using Keepass for years. I back up the one data file to my external drive and to my cloud drive (where it syncs to my phone). It's exactly how I back up my other data files (spreadsheets, documents, photos). Theoretically an easy and straightforward process.[A]lso I do support the recommendation of KeePass if you really do need that extra security. Just be very sure you have thought through all the potential issues with syncing it yourself. It can be the most secure option - but if you don't know what you're doing it's probably not.