• @thisisawayoflife
    link
    581 year ago

    Been using KeePassXC (and before that, KeePassX) since I abandoned LastPass about a decade ago. The apps integrate with Nextcloud perfectly and at least for me, it’s a breeze. I use it for TOTP too, and I second the recommendation of a hardware token for an additional layer of security. There are some USBc options that work on phones (I’m using a pixel 7 pro).

    • jelloeater - Ops Mgr
      link
      English
      51 year ago

      I never got YubiKey to work on desktop with it. Key files seem to work good enough and easy to manage.

      • Rootiest
        link
        fedilink
        English
        6
        edit-2
        1 year ago

        YubiKey works for me, both on desktop with KeePassXC and on Android with KeePassDX to the same DB

        • @chockblock
          link
          31 year ago

          I like the look of KeePassDX but I was bothered by the fact that I have to use the yubikey every single time to unlock the database, unlike keepass2android which allows me to store the yubikey credential with biometric lock until the phone restarts. Keepass2android is not as nice of an app but that feature was really required for me.

          • Rootiest
            link
            fedilink
            English
            31 year ago

            KeepPassXC can do this as well, but it does require the yubikey to be inserted every time you want to save a change to the database.

            Look under Settings -> Security -> Convenience -> Enable database quick unlock (Touch ID/Windows Hello)

            Using that I can quick-unlock my database using my laptop’s fingerprint scanner, just like how KeepPassDX works on Android.

            • @chockblock
              link
              31 year ago

              its not a huge issue on KeePassXC because I keep a yubikey nano plugged into my laptop, but for my phone, I haven’t been able to make this work reliably with KeePassDX. I’ll have to give it another go.

              • Rootiest
                link
                fedilink
                English
                21 year ago

                Ah yeah you are right, it makes me tap my key every time I open the app.

                The biometrics seem to only replace the master password.

                I do wish it worked more like KeePassXC where the key is only needed to save the database after unlocking and confirming with fingerprint

      • @chockblock
        link
        41 year ago

        It does require some configuration within yubikey manager. I did not find it straightforward but once set up its really reliable.

    • FlumPHP
      link
      fedilink
      21 year ago

      I’m curious about using the same store for passwords and TOTP. Technically if someone gets screwed to your database, they have both your factors, yes? But I guess it does thwart someone trying to brute force your password.

      • @thisisawayoflife
        link
        3
        edit-2
        1 year ago

        Adding a hardware key, like Nitrokey, would be an additional level of safety there. I would not use the database without some kind of additional key (something you know and something you physically have).

        If there’s something nefarious that has user access, you’ve already lost in that regard.

          • @[email protected]
            link
            fedilink
            21 year ago

            This is what I do: I have 3 KeepassXC databases (regular passwords, “security” questions, TOTP tokens) each with a different password.

      • Amju Wolf
        link
        fedilink
        English
        11 year ago

        Technically you do lose the second factor, but nowadays 2FA is often mandatory or they force some crap like SMS/email verification onto you. If you are aware of the risk then it isn’t a huge deal.

        Though you might want to consider not using it at least for the most important stuff like banking (here you don’t even have an option; banks have their own 2FA apps that you have to use) and primary/recovery email.