If you are interested in privacy you are probably interested in password storage … plus I wanted everyone to know about the inevitable future enshitification of this product. Spread the word and replacement recommendations are welcome too.

    • potustheplant@feddit.nl
      link
      fedilink
      arrow-up
      9
      ·
      11 hours ago

      Doesn’t keepass only work on a single device? Meaning that you have to handle syncing the database file yourself. I prefer selfhosting vaultwarden. Maybe these changes will make me migrate to something else but for now I’m very satisfied with vaultwarden and the bitwarden client.

      • AHemlocksLie@lemmy.zip
        link
        fedilink
        arrow-up
        9
        arrow-down
        2
        ·
        10 hours ago

        Yeah, I just leave the file in a NextCloud sync directory. All my desktops and laptops download it automatically, and it’s trivial to download to my phone. As an added bonus, my fucking password manager isn’t exposed to the open internet where every hacker who finds it is gonna wonder what’s inside.

        • potustheplant@feddit.nl
          link
          fedilink
          arrow-up
          4
          ·
          edit-2
          3 hours ago

          You need two apps though and I personally have more faith in vaultwarden being stable than nextcloud.

          Glad your “fucking” password manager isn’t exposed to the internet. Mine isn’t exposed either since I use tailscale to access it. Your comment leads me to believe that your NextCloud instance IS exposed to the internet. Wouldn’t that mean that if a hacker gets access to your account they could also get your keepass file as well?

          • AHemlocksLie@lemmy.zip
            link
            fedilink
            arrow-up
            1
            ·
            2 hours ago

            I just typed out a response to most of this, and rather than repeat all that, I’ll copy a link here https://lemmy.zip/comment/26557132

            A lot of it can be summed up in that compromising Vaultwarden means everything is screwed while compromising NextCloud is mainly a minor inconvenience. It provides neither information about the database’s password nor any avenue to attempt to intercept the password.

          • AHemlocksLie@lemmy.zip
            link
            fedilink
            arrow-up
            1
            ·
            7 hours ago

            At that point, is it really easier than NextCloud? I don’t have to worry about forgetting to disconnect and wasting my VPS’s bandwidth or ruining my ping for games. On PCs and laptops, the file is immediately local, and on mobile, it’s easier to download an updated version of the database than it is to mess with the VPN.

            • dogs0n@sh.itjust.works
              link
              fedilink
              arrow-up
              1
              ·
              2 hours ago

              That’s a fair point, I was mostly pointing out in the original comment that VPNs are an option that stops your password manager being exposed to the internet (though if their NextCloud IS exposed to the internet and is syncing their password db, then there is not much difference).

              Plus you can tunnel traffic that needs to go to your VPS through the VPN, leaving all other traffic untouched (ie not tunneled), if you are worried about leaving it connected by accident. This would be max convenience.

              • AHemlocksLie@lemmy.zip
                link
                fedilink
                arrow-up
                1
                ·
                2 hours ago

                Compromising Vaultwarden provides an opportunity to inject malicious JavaScript and steal the database password when it’s opened. NextCloud can never leak any info about how I open my password database.

                • dogs0n@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  edit-2
                  2 hours ago

                  Any password manager could be comprimised. A bug could even be installed on your system or malware. What’s the difference?

                  NextCloud doesn’t know how you open the password db, but KeePass (for example) does, so the master pass comprimise would be with that.

                  Specifically the syncing part being done with any tool, doesn’t matter.

                  Who or how are you thinking Vaulwarden is being comprimised?

                  • AHemlocksLie@lemmy.zip
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    53 minutes ago

                    Sure, any manager could be compromised, but no client that handles my password database in any way connects to the internet, and all of them come from either signed Linux packages or signed Android apps. If Vaultwarden has a security vulnerability, you can steal the key and the database. If NextCloud is compromised, you can steal the database but not the key. To compromise the password manager client would require either stealing the publishing keys or getting the original author to publish a malicious version.

            • potustheplant@feddit.nl
              link
              fedilink
              arrow-up
              2
              ·
              4 hours ago

              Yup, it is. On one hand, I would have wireguard configured regardless beacause I don’t like publicly exposing my server. On the other, if you had to do it just for this and don’t want to configure wireguard manually, just use zerotier, tailscale or netbird. They can be set up in like 15 minutes and after you get it working you don’t need to touch it again.

              • AHemlocksLie@lemmy.zip
                link
                fedilink
                arrow-up
                1
                ·
                4 hours ago

                Eh, not worth it to me. Some of what I host is occasionally really handy to be able to access from a random machine, and I don’t want to have to deal with barriers to entry when I need in. I can appreciate the security benefits, but I’ll take my chances. Even if they break into my NextCloud, they’d have to crack an unreasonable password to break the password database open.

                • dogs0n@sh.itjust.works
                  link
                  fedilink
                  arrow-up
                  1
                  ·
                  2 hours ago

                  You are choosing more convenience over security, which is fine, BUT it’s good to know that syncing your passwords with NextCloud over the internet is not any more secure than syncing it over the internet any other way (that uses any encrypted transport method).

                  • AHemlocksLie@lemmy.zip
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    56 minutes ago

                    Not necessarily. Compromising Vaultwarden would allow you to inject malicious JavaScript into the login page to steal passwords. NextCloud in no way interacts with the password database, so it provides no attack surface to the password database itself. Compromising the client for my password manager would require a supply chain attack on a Linux distribution’s package repository or theft of the package signing keys for the Linux distro or the Android app

                • potustheplant@feddit.nl
                  link
                  fedilink
                  arrow-up
                  2
                  ·
                  3 hours ago

                  There’s this wild technology called a hotspot. You can use your already authenticated device to give another device access to your services indirectly.

                  Even if they break into my NextCloud, they’d have to crack an unreasonable password to break the password database open.

                  That level of security is exactly the same as exposing your password manager to the “fucking” internet. Not sure why you criticized it before when you (incorrectly) assumed that I was doing that.

                  • AHemlocksLie@lemmy.zip
                    link
                    fedilink
                    arrow-up
                    1
                    ·
                    edit-2
                    2 hours ago

                    There’s this wild technology called a hotspot.

                    There’s also this dated technology called a wired connection that some other dated technologies require. Since I don’t get to choose every device I interact with or depend on, that’s not always available.

                    That level of security is exactly the same as exposing your password manager to the “fucking” internet.

                    I would disagree. A Bitwarden instance identifies itself as such to every visitor that comes by. It advertises itself as a particularly high value target. By contrast, a lot of what a NextCloud instance hosts is often personal and more valuable to the user than a hacker, so it does not become clear if there’s anything of value inside.

                    It also decreases the attack surface of my password manager itself because there are fewer features in it that may have a potential exploit. Even if an attacker compromises the NextCloud instance, that may grant access to the file itself, but they still have to contend with the entire security of the password manager. No device will ever make any contact with the server for password purposes other than to sync the database file, and there’s no web interface to inject a password stealing JavaScript file.