this post was submitted on 19 May 2023
20 points (100.0% liked)

Technology

37730 readers
743 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS
 

The vulnerability affects the KeePass 2.X branch for Windows, and possibly for Linux and macOS. It has been fixed in the test versions of KeePass v2.54 – the official release is expected by July 2023. It’s unfortunate that the PoC tool is already publicly available and the release of the new version so far off, but the risk of CVE-2023-32784 being abused in the wild is likely to be pretty low, according to the researcher.

you are viewing a single comment's thread
view the rest of the comments
[–] sxan@midwest.social 12 points 2 years ago (5 children)

No.

Tge real answer is not to give control of your passwords to a third party; it's to not use crappy .Net programs.

KeePassXC is not affected.

[–] charlesroper@indieweb.social 9 points 2 years ago (2 children)
[–] sxan@midwest.social 5 points 2 years ago

I read that! Props on the auditor for doing it gratis; it's rare to see people pay back the benefit they get from OSS.

[–] charlesroper@indieweb.social 4 points 2 years ago (3 children)

@sxan @admin @rysiek You can also self-host Vaultwarden. Nice and easy to do via Elast.io: https://elest.io/open-source/vaultwarden

[–] admin@beehaw.org 3 points 2 years ago

That looks like a very good option.

[–] WillowMist@tech.lgbt 3 points 2 years ago (2 children)

@charlesroper @sxan @admin @rysiek What's the difference between vaultwarden and bitwarden?

[–] admin@beehaw.org 4 points 2 years ago (1 children)

Alternative implementation of the Bitwarden server API written in Rust and compatible with upstream Bitwarden clients*, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal.

See: https://github.com/dani-garcia/vaultwarden

[–] WillowMist@tech.lgbt 4 points 2 years ago

@admin FAntastic, thanks. I'm self-hosting Bitwarden now, but I'm always interested in streamlining things.

[–] smorks@social.linux.pizza 2 points 2 years ago (1 children)

@WillowMist @charlesroper @sxan @admin @rysiek from their github page: https://github.com/dani-garcia/vaultwarden

Alternative implementation of the Bitwarden server API written in Rust and compatible with upstream Bitwarden clients*, perfect for self-hosted deployment where running the official resource-heavy service might not be ideal.

[–] charlesroper@indieweb.social 4 points 2 years ago (1 children)

@smorks @WillowMist @sxan @admin @rysiek Right. It's an alternative to the official Bitwarden open source server (https://github.com/bitwarden/server), which is all .net and sql server and is quite heavy host yourself (apparently). That means most people end up using Bitwarden's own official hosted service. Vaultwarden is a popular and active alternative to Bitwarden Server. It is written in Rust so is a lot lighter on resource requirements. You can easily spin up an instance on Elestio or Cloudron.

[–] charlesroper@indieweb.social 4 points 2 years ago (1 children)

@smorks @WillowMist @sxan @admin @rysiek Once you have your own Vaultwarden running, you can use any of the many Bitwarden clients with it:

https://bitwarden.com/download/

[–] charlesroper@indieweb.social 4 points 2 years ago

@smorks @WillowMist @sxan @admin @rysiek Just seen @cloudron are here on the fedi - they also offer a really easy way to host Vaultwarden for yourself, along with loads of other good quality open source products. Worth a look.

load more comments (1 replies)
[–] Hirom@beehaw.org 6 points 2 years ago* (last edited 2 years ago) (1 children)

Even KeepassXC, which used Qt instead of .NET, aknowledge they can't garantee that things put the UI, such as the passphrase, won't appear in memory dump, even though they attempt to clear memory.

Any password manager with a UI is at risk, but KeePass should definitely do a better job at mitigating this risk.

[–] sxan@midwest.social 6 points 2 years ago (2 children)

I don't know which software, that can ever handle passwords, is immune to a hostile user capable of doing memory dumps on the target's memory space. Are you aware of one?

This threat model would require inter-process memory security at the OS level; you'd need to be running BSD, or some microkernel. You're not getting those protections on mainstream OSes, even with SE Linux, and every application that ever handles credentials in plain is at risk.

The point about Qt (and, TBH, probably about .Net) is how long the password remains in memory, and ao how big the attack vector window is, not whether or not it's completely immune to memory dump-level threats. 'Cause Windows and Linux are both susceptable to that.

Right?

load more comments (2 replies)
[–] sexy_peach@feddit.de 5 points 2 years ago (1 children)

Yes, I was hoping that KeePassXC is not affected, thanks for confirming!!

[–] sxan@midwest.social 3 points 2 years ago

The audit is an interesting read. The author comes off a little fan-boyish, but has good credentials and his points are well reasoned.

I'm not a security specialist, but I thought the report understandable, approachable, and brief - in short, quite readable, and informative.

[–] admin@beehaw.org 4 points 2 years ago (2 children)

KeePassXC could be another viable choice. Bitwarden has been free of any incidents for the eight years that I've been using it.

[–] rysiek@szmer.info 9 points 2 years ago

Bitwarden is also FLOSS and self-hostable. As much as I love KeePassXC, using it for team passwords is a pain. Having a self-hosted Bitwarden thingy would be way better.

[–] sxan@midwest.social 2 points 2 years ago (2 children)

I just don't like having to depend on a third party, or like the idea that they have access to my keys - even encrypted. It's too many eggs in one basket, for my taste.

But lots of people like it, and I've never heard of any criticisms of it from the security community, so it's probably an acceptable choice.

[–] viq@social.hackerspace.pl 4 points 2 years ago

@sxan @admin 1password is interesting since they have taken steps to make sure even full access to their servers does not mean access to contents of your vaults, since vaults are client side encrypted, not only with key derived from password, but also by another key you need to transfer between your devices for another device to be able to access the stuff.

[–] admin@beehaw.org 2 points 2 years ago (1 children)

Would self-hosting (as @charlesroper@indieweb.social explained here) be a more comfortable option for you?

[–] sxan@midwest.social 2 points 2 years ago

Yes.

However, I'm perfectly happy with KeePassXC. It's audited, secure, has a great UI, and if you want to accept less security can serve as a secret-service and ssh-agent replacement. There are a bunch of OSS tools and clients that support the kbx.v4 file format, and if you want to audit the code of the tools, they're in almost every language. There are some really nice (pretty, user friendly) native mobile apps.

There's risk in grabbing any old client, of course, but having such a diverse ecosystem is nice, especially if you don't mind reading some code.

[–] potatoxel@pleroma.potatoxel.org 3 points 2 years ago

@sxan @admin i use pass :3 it gud