72 points by louib 7 days ago
I was only aware of Keepass itself.
What are the differences between KeypassXC, KeepassX and Keepass?
KeePass is the original project. It is an open source dotnet application. The source code, as of the last time I checked, is released as a tar/zip with the binaries only.
KeePassX is an open source c++ application. It was one of the cross platform applications to manage KeePass databases. It has not been under very active development for a while.
KeePassXC is a fork of KeePassX which is under active developement. They have added many features and improvements and has stayed up to date with kdbx updates.
KeePassXC is fantastic, I especially like the good Yubikey integration. The one small feature I miss from the original KeePass was the password templates. I like all my passwords to follow a grouped pattern so its easier to type into a phone or something while still being strong.
Keepass has templates for password generators. You can create custom templates as well. I've been using it since 2008 without any issue.
do you mean keepassXC? His statement was saying he missed this feature that is in keepass.
I use keepassxc with yubikey as well. I like it because it’s cross-platform. It works quite well.
Is KeePassXC also audited? The main KeePass has had multiple security audits, also thanks to the EU who funded it one time. Seems relevant for a password manager.
While I like KeePassXC more, this is even more relevant as KeePassXC is made in C++, while Keepass is made in C#. C++ makes it easier to shoot yourself in the foot.
It hasn't: https://keepassxc.org/docs/#faq-audit
There is still an active KeePass bug bounty from the european commission:
The difference is the UI. They all use the same* database format underneath.
Thr original Keepass was at first a Windows only app, so KeepassX was created as a cross platform reimplementation using Qt. Nowadays Keepass uses .Net and also is cross platform but Linux users prefer Qt because it feels more "native" than .Net.
KeepassXC is a more recent fork of KeepassX, which added a bunch of extra features. Notably, it added support for version 4 of the keepass database format, and it also allows you to use a browser extension to enter passwords inside web browser forms without needing to cut and paste.
Explained in detail here:
I'm a LastPass user trying to switch to KeePassXC. I tried it once on my computer but couldn't find a way to create folder inside a folder inside a folder and so on. I like organizing everything so this is the only thing holding me from switching to KeePass. BTW is it possible to do that in KeePass? I haven't explored it a lot.
I've got a complex hierarchy of folders (Groups in Keepass terminology) in some of my Keepass files. It's definitely possible to do, some of the UIs are better than others at making it obvious.
While I love KeePassXC this is just a minor bug fix release.
It is, but the 2.4 release introduced integrated updates. I was still on 2.3 and wasn't aware of this, or that my KeePass was out of date until I saw this this morning. So I am thankful for the heads up. :)
I switched to KeePassXC a few months ago (from KeePass). It was a no brainer when I noticed that I didn't need plugins anymore, since SSH keys, TOTP, and browser integration came out of the box.
KeePassXC still lacks in-memory protection, so I stay with KeePass, with all its .NET troubles.
(Full disclosure: I contribute to KeePassXC)
In fact, KeePassXC has shown to have better memory protection than KeePass: https://keepassxc.org/blog/2019-02-21-memory-security/ (note the article is from February, some things have changed since then, see below).
The only thing we do not have at the moment is in-memory encryption. We do, however implement the following security measures on all platforms:
- prevent swapping of master key hashes (using gcry_malloc_secure)
- prevent non-root / admin access to our process memory (KeePass does NOT have this)
- overwrite all dynamically allocated memory with zeros on free
- disable any kind of coredump or crash reporting
A patch for in-memory encryption is being worked on, but needs further testing before it can be merged: https://github.com/keepassxreboot/keepassxc/pull/3055
Please note that this still cannot fully prevent swapping out of secrets. As soon as things are to be displayed somewhere in the GUI, they are basically out of our hands. We also cannot fully protect everything while the database is being loaded or written. However, the same applies to KeePass. There is just too much going on with memory management on modern operating systems.
Thank you. You convinced me to try KeePassXC again.
I thought that it did now. For example this PR: https://github.com/keepassxreboot/keepassxc/pull/3020
Edit: Also, see this PR: https://github.com/keepassxreboot/keepassxc/pull/371
I'd guess it's this one:
> KeePassXC also cannot prevent data extraction from a hibernation file which stores your computer's memory to disk when going to sleep.
KeePass uses DPAPI so password-storage memory is not written to swap (and I guess hibernatefile) in cleartext. Note that this doesn't protect against reading the memory directly.
Though (on unices) it doesn't mention mlock(2) either.
 https://www.securityevaluators.com/casestudies/password-mana... subsection "Exposure of Cleartext Entries in Memory" of the Keepass section
Thanks for pointing out. Nice to see progress in this direction.
Can elaborate more on the practical benefits of encrypted memory? Presumably this is mainly good for multi-user systems? On the average single-user system it seems that if you can already read memory there are 1000 other possible exploits that are cheaper / easier to perform (ie. keylog, screen capture, etc).
AFAIK the only thing it protects you from is generic malware that scans process memory for passwords. It’s trivial to bypass though: all you need to do is patch the code as it’s running to dump all the plaintext entries for you.
> there are 1000 other possible exploits that are cheaper / easier to perform (ie. keylog, screen capture, etc).
Keepass has mitigations for those as well.
> AFAIK the only thing it protects you from is generic malware that scans process memory for passwords.
Apparently it doesn't even do that: https://www.securityevaluators.com/casestudies/password-mana... (section Keepass)
Possibly because keepass uses the wrong flag? https://docs.microsoft.com/en-us/dotnet/api/system.security.... seems to say that the memory segment can be decrypted by either:
* all processes running on the box
* all processes owned by the same user
* only this process
Alternatively, might be because C# and the memory protection primitives don't prevent the GC from copying its data out of the protected area? IDK
edit: ah, or they might be using ProtectedData rather than ProtectedMemory, that only has the "same machine" and "same user" levels of protection: https://docs.microsoft.com/en-us/dotnet/api/system.security....
Crash reports often include memory dumps. Firefox automatically reports these to Mozilla - there's plenty of other software that auto-reports crash data as well. If that crash data includes in-memory credentials, that could lead to your master password being compromised.
KeepassXC disables core dumps.
> Crash reports often include memory dumps. Firefox automatically reports these to Mozilla
Of the process in question, not the entire system. A Firefox crash dump can potentially still include credentials and private keys, of course.
What troubles? I recently started to use it, and so far I did not encounter any troubles. For me the killer feature of KeePass is that it allows me to safely use it without typing master password using -pw-enc command line argument. I hated to type my password every day over and over again with 1Password. Especially because I understand that it's very weak protection if someone already break in my computer.
I reckon OP dislikes the need to have the whole Mono runtime to run one small-ish application. At least that's the reason I always preferred the native ports.
Ah, I'm Windows user, I didn't even know that you could run KeePass on non-Windows systems.
> without typing master password using -pw-enc command line argument
Process command lines are world-readable on various operating systems, so passing passwords over them is generally not a good idea.
It's not a clear text password. It's encrypted with Windows user credentials. If someone just steals it, it won't be useful by itself.
Been using BitWarden since I stopped using LastPass (lost my 10 year old vault) anybody know of any good reviews of all the different types of password managers that go into the security flaws / considerations?
There are a couple of recent posts / discussions on HN regarding the topic: https://hn.algolia.com/?query=password%20manager&sort=byPopu...
I switched from Lastpass to Bitwarden about a year ago as well. I have no complaints except for a few minor UX annoyances in the firefox add-on.
Anyone got any good recommendations for an iOS client. I've just moved from android and there's several but not sure which to pick, which are opensource etc.
it's very basic but it works. if you keep the kdbx file in cloud storage, you can use iOS "open with" to open in MiniKeePass.
Strongbox is the best one right now. It supports KDBX 4, while older minikeepass doesn't.
Ye I'm using that right now but 25.99 GBP is a lot for me as a student. I know software development isn't free, don't mind paying say 10, but 25.99 is quite a stretch for me :(
I use KyPass on iOS and I am happy with it. I think it is 6$ on the app store.
Anybody know if they've fixed (or plan to fix) the sort by latest modification date of all records? That was the one missing feature from going from KeePassX to KeePassXC.
I am able to sort by latest modification date (not sure if thats what you meant).
I switched from KeePass to KeeWeb because of the user interface and Google Drive integration. KeeWeb is an open source cross platform Electron app.
Why should I switch from pass (git+pgp) to keepassx ?What's one feature in keepassx nto in pass/passx
For me the biggest difference is that you have a single encrypted database file, and that no metadata is stored unencrypted. By default, pass uses file names as keys, so website names are stored in the clear. (To fix this on pass.you need to use pass-tomb, which I found very clunky, and could never get working quite right)
Another thing I like about keepassxc is that it has lots of features. It comes with a flexible passwird generator, has a friendly GUI UI, can be integrated to the web browser using an extension, and there are compatible android apps you can use on your phone.
I agree about the metadata. I like pass but it's a flaw for sure. At least it's upfront about it.
Most other issues are covered with pass, like a good android app etc etc.
You could always use pass-tomb, which is an extension that stores the entire tree encrypted.
As I mentioned further up, pass tomb needs to be installed separately (which is not trivial depending on your distro) and is clunky to use. AFAIK it also cannot be used to encrypt the password database on Android.
It also really bugs me that an important security feature like this one is not the default.
tomb seems fine on ios and android. I don't use it though
This is a common claim, and besides that fact that tomb fixes it and is supported on all distributions, I'm not convinced it's a problem. What's the threat model? That folder should be 700 anyway? Or is this just paranoia?
but exposes to who?
I am a pass user and for me the big drawback is that is exposes the website names by design.
Is it possible to sync your passwords with other devices?
Yes, you can store the database file in a shared drive (not sure that's proper security though)
That is secure as long as you have a good master password
KeePassXC works really well with Yubikey too. I use a Yubikey and a short pin for the password.
You can use password protection on the drive as well as IP restrictions.
You could even offer the drive only in your home network on your NAS.
You can use a combination of a password to together with a key stored locally on all devices
But how do you read the passwords from let's say iOS ? I don't see any iOS client on the website.
You need to download an app. Search keepass on ios (I use android so I can't recommend one to you). They won't be made by the same people, but they can use the same password database
You use any Keepass compatible iOS client and access the same file (for example using a WebDAV share)
I setup two-way sync of the database with my android phone using syncthing - works flawlessly.
What's the difference between just opening the file directly on a shared drive? Possible conflicts with opening the database in multiple apps?
Wouldn't that require mounting of the shared partition on Android (or making it available is some day)? With syncthing, there is no such requirement.