this post was submitted on 13 Oct 2023
148 points (92.0% liked)

Selfhosted

40337 readers
582 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I've always hated the idea of using a subscription/cloud hosting for password management. I feel like I should have a LOT more control over that stuff and I don't really want to hand all my keys over to a company.

All my secrets have been going in a highly encrypted archive with a long passphrase, but obviously that isn't convenient on all devices. It's been fine, I can open it on any computer but it's not super quick. It does have the advantage of being able to put in multiple files, notes, private keys but it's not ideal.

Anyway, finally found something that isn't subscription, and has a similar philosophy - a highly encrypted archive file, and it's open source and has heaps of clients including web browser plugins so it's usable anywhere, and you can sync the vault with any file sync you like.

Thought you guys might appreciate the find, password managers have always been a bit of a catch 22 for me.

Note for android i found keepassxc the best app, and i'm using KeePassHelper browser plugin, and the KeePassXc desktop app as well as the free official one. Apps all seem to be cross platform.

you are viewing a single comment's thread
view the rest of the comments
[–] Synnr@sopuli.xyz 15 points 1 year ago* (last edited 1 year ago) (2 children)

Yup, I have been using KeePassXC locally since (one of) the first big LastPass breaches. I thought "password manager company... they know encryption" and then kept some of the most important things stored in my vault including notes of Bitcoin seedphrases etc. Thought "even if they get hacked, they wouldn't let anyone exfil the huge amount of data from the USER VAULT SERVER.... thought "my passphrase is like 25-30 chars long, nobody will crack that"...

5 years after my last login and I find out the breach happened, user vaults were exfil'd, the encryption was absolute shit, and the notes weren't even encrypted.

I don't trust cloud companies to keep promises or know what they're doing today. and anything self-hosted isnt Internet accessable unless it's on dedicated hardware subnetted off and wouldn't matter if it got hacked.

[–] Appoxo@lemmy.dbzer0.com 7 points 1 year ago (1 children)

Bitwarden for example does public reports and is pretty cheap at 10€ per year. But the base (free) offering is more than enough. The fee is only to have TOTP and a bit of encrypted cloud storage. https://bitwarden.com/help/is-bitwarden-audited/

[–] dan@upvote.au 3 points 1 year ago

The fee is only to have TOTP and a bit of encrypted cloud storage.

And to keep the company alive. It's cheap enough that IMO it's worth paying for if you get a lot of value from it, even if you don't need the paid features.

[–] Quacksalber@sh.itjust.works -1 points 1 year ago (1 children)

In theory at least, online services would be more safe than a locally decrypted vault. If your computer is compromised, the bad actors can pull your encrypted vault for an unlimited brute force attack. Of course, this can be mitigated by increasing the decryption time. However, if your vault is already decrypted, then bad actors can just pull all your password from your memory.

I, for one, am decrypting my vault once when I start my PC. In theory, if I were to use an online solution, bad actors wouldn't be able to pull my vault from memory.

[–] Synnr@sopuli.xyz 3 points 1 year ago* (last edited 1 year ago)

In theory, if I were to use an online solution, bad actors wouldn't be able to pull my vault from memory.

It's the same issue once you login to your vault via browser extension. They have to download your vault locally on login to decrypt it when you enter your password anyway*. Even if they don't store your vault password in memory, they either store the entire vault (unlikely for size reasons) or a more temporary key to access the vault. Local compromise is full compromise already.

*If they don't, then they either made a giant technological leap, or they're storing your passwords on a simple database on their servers and that's not what you want from a password manager.