Ask HN: What password managers can you recommend?
Are there any password managers that
- Integrate into browsers on all major platforms
- Have decent password generators
- No major security breaches in past ten years
- Local-first / sync via standard sync mechanisms (Dropbox, iCloud, sync thing, etc.)
EDIT: Based on responses below, I'm going to try KeePass[.*] and see how it goes. First hiccup is that 1Password import doesn't seem to work, but I'll keep at it.
[+] [-] brycewray|4 years ago|reply
[0]: https://www.brycewray.com/posts/2021/06/two-paths-password-m...
[1]: https://www.brycewray.com/posts/2021/08/1password-hits-fan/
[+] [-] tcfhgj|4 years ago|reply
[+] [-] jstx1|4 years ago|reply
[+] [-] schleck8|4 years ago|reply
[+] [-] itake|4 years ago|reply
[+] [-] dabber21|4 years ago|reply
[+] [-] tcfhgj|4 years ago|reply
[+] [-] senectus1|4 years ago|reply
I default to it for anyone looking for this solution.
[+] [-] drcongo|4 years ago|reply
[0]https://outercorner.com/secrets-mac/
[1] https://elpass.app
[+] [-] santoshalper|4 years ago|reply
[+] [-] beckler|4 years ago|reply
[+] [-] Sanzig|4 years ago|reply
https://www.passwordstore.org/
Pass uses GPG under the hood for encrypting the password store. I use an OpenPGP smartcard (a Yubikey in my case) to decrypt the password files. I synchronize the store across devices using Git. There are good autofill implementations for Firefox and for Android. When I need a password, the autofill prompts me to insert my Yubikey and enter in the unlock PIN, which I find more convenient than a master password. Crypto functions are offloaded to the Yubikey with a (theoretically) very difficult to extract private key, so unless somebody swipes that they can't get into my passwords.
I mostly followed this guide for setting it up: https://dehnes.com/software/2020/04/03/password_management_y...
[+] [-] sam_lowry_|4 years ago|reply
[+] [-] mariusor|4 years ago|reply
[+] [-] taxcoder|4 years ago|reply
[+] [-] blacksmith_tb|4 years ago|reply
1: https://keepassxc.org/
2: https://syncthing.net/
[+] [-] jdmichal|4 years ago|reply
[+] [-] tmikaeld|4 years ago|reply
It's been audited [0] by external companies multiple times and both the client and the server are fully open source [1].
I know others may say that the encryption is too weak[2], but that's true for all other password managers too [3], since Argon2id is not mature enough to run as a WASM module in the browser yet (especially not on mobile).
[0] https://bitwarden.com/help/article/is-bitwarden-audited/
[1] https://github.com/bitwarden
[2] https://github.com/bitwarden/jslib/issues/52
[3] https://github.com/bitwarden/jslib/issues/52#issuecomment-78...
[+] [-] bloopernova|4 years ago|reply
If you don't self-host, note that everything is encrypted before being stored at bitwarden. They don't have access to your passwords.
[+] [-] silisili|4 years ago|reply
Having a reliable, stable PW manager with a good app and TOTP capabilities feels like a steal at that price.
[+] [-] torstenvl|4 years ago|reply
Import/export is irrelevant. I want to own my data, not just be able to check out a copy whenever I want.
[+] [-] dxf|4 years ago|reply
[+] [-] gspr|4 years ago|reply
With git or whatever you want for sync, and whatever GPG-compatible security device you want for encryption.
I swear, pass is the piece of software that has improved my digital life the most per line of code in the software.
[+] [-] abfan1127|4 years ago|reply
[+] [-] computershit|4 years ago|reply
Ask HN: How did my LastPass master password get leaked?: https://news.ycombinator.com/item?id=29716715
LastPass users warned their master passwords are compromised: https://news.ycombinator.com/item?id=29716715
[+] [-] basseq|4 years ago|reply
The LastPass app itself is just "ok" from a UI perspective, but again, I use that part rarely.
[+] [-] mmettler|4 years ago|reply
I hear you about problems with a server/subscription-based model, but a) it's the least of all evils, and b) I've come to enjoy financially supporting them (i.e. my subscription means they can keep making great software, which is definitely valuable to me).
[+] [-] chenxiaolong|4 years ago|reply
As for the software I use to access the database:
* On Windows/Linux, I use KeePassXC with the corresponding browser extension. I also use the built-in SSH agent integration so I don't need to store my private keys in ~/.ssh nor manually type in their encryption passphrase.
On Windows, auto-type works great for the most part, except in ancient applications that only support scan-code-based input and not Unicode-based input (shakes fist at IPMI consoles of brand new servers that _still_ use ancient noVNC versions without support for Unicode input). I build KeePassXC from source to include a not-yet-merged patch for scan-code support.
* On Android, I use KeePassDX (open source). It integrates with Android's autofill API, but also has a keyboard for typing the username/password/TOTP code into apps that don't support autofill.
* Back when I still used iOS, I used Strongbox (open source, but does not accept contributions). It integrates with iOS' autofill API.
For syncing, I use SyncThingTray on Windows/Linux and SyncThingFork on Android. On iOS, I used to have Strongbox connect via sftp to my server running SyncThing because I could not find a decent SyncThing client. (I'm not even sure it's possible to implement on iOS without resorting to abusing location services for background execution, like iSH or most SSH clients.)
[+] [-] torstenvl|4 years ago|reply
[+] [-] dhritzkiv|4 years ago|reply
[+] [-] gmoore|4 years ago|reply
[+] [-] durakot|4 years ago|reply
[+] [-] madmonk|4 years ago|reply
https://github.com/madmonk13/keymaster
This is the first time I've publicly shared it and I welcome your feedback.
[+] [-] wepple|4 years ago|reply
In practical use, how do you typically remember whether or not a site allows special characters or has a length requirement? Also do you ever have trouble remembering what you named a particular thing? Might be easy for something with an FQDN, but for an encrypted vault or ssh key may be harder
Edit: on second thought, the use of only a numeric pin (with suggested length of 4) seems not good from a security perspective. For an offline attack against, say, a true crypt partition I could offline attack a fairly large pin space with a number of different names fairly trivially. Even in an online attack, if I assume you’re sticking with a 4-digit pin and using the site name “Facebook” then I have a 1/10000 chance, which drops to 1/2500 if Facebook lets me have 4 attempts. The PIN should be a pass phrase IMO
Edit2: please take these criticisms as genuine feedback, as I think this is an excellent idea and I’d like to use it myself. I’m curious why no true cryptographic hash algorithms were used? I only skimmed the code, but I’m concerned that under a model where 1 or especially 2+ passwords are leaked (inevitable in this day), there would be non-zero leakage of intermediate stages if not the original pin. The other challenge I see is the integrity of the JS - would folks self-host this? Otherwise you could possibly use Subresource integrity to load the JS from an untrusted source, and the user would manually verify the SRI key or something
[+] [-] knowingpark|4 years ago|reply
[+] [-] torstenvl|4 years ago|reply
[+] [-] c7DJTLrn|4 years ago|reply
[+] [-] putlake|4 years ago|reply
[+] [-] SamuelAdams|4 years ago|reply
[+] [-] kristiandupont|4 years ago|reply
[+] [-] sushisource|4 years ago|reply
* Sometimes you need to fill passwords on app login screens on your phone, for example. At least 1Password for your phone can do this.
* I sometimes need to fill passwords in non-browser apps. I can use a global shortcut to easily open my password list and copy what I need without touching the mouse.
* I want to store things that aren't passwords securely.
Etc
[+] [-] abfan1127|4 years ago|reply
[+] [-] thebean11|4 years ago|reply
[+] [-] unknown|4 years ago|reply
[deleted]
[+] [-] Ottolay|4 years ago|reply
[+] [-] darksofa|4 years ago|reply
https://www.pwsafe.org/
Designed by Bruce Schneier
https://www.schneier.com/academic/passsafe/
Mobile clients available and you can sync via Dropbox or iCloud.
[+] [-] firepacket|4 years ago|reply
It is Dropbox friendly meaning any change or addition in another person using the same vault in the same directory is automatically updated in all open vaults. This was originally for collaboration. You can have your own private vault too with a unique password, as many as you like. They just end up as XML files. It runs fast as uses databinding, can generate strong passwords, and makes copying/pasting easy. I am having trouble encrypting files over 1GB though.
I take great lengths to protect the key. If the file is open too long, it minimizes and locks, when you open it, it decrypts everything again. As soon as decryption is done, the key is stashed away using ProtectMemory function in the framework. I have done memory dumps to ensure the key is not visible when the app is idle.
Files works differently, Their meta data is encrypted but you are able to checksum then and preview them in memory without the key ever being exposed and the content never touches the disk and is zeroed afterward. You can currently play sound, view pictures, execute files (in memory!) and soon video.
I plan on browser integration by a cross-browser userscript and loopback routing (127.0.0.1) that recognizes when the cursor is in a field specified in the login's metadata. But I am am running into trouble because sites like to randomize the name of the login fields, so I a have to use some reliable heuristic approach.
Does anyone have any ideas on how to deal with that? If I can figure that out, and get video previews working I will open source it.
EDIT: Here's a preview of the app: https://imgur.com/a/rZGPCPZ