I wanted to ask if it was possible, in any way, to have the convenience of just having to sync a single passwords file, while also having the security of putting more sensitive login credentials behind a different or additional passwords?

On my computer, I usually have KeePassXC unlocked for the entirety of being logged in. So if my computer were to be compromised, the attacker would not only get access to relatively unimportant accounts, like this Lemmy account, but also highly important ones, like my email or bank login credentials. So I’d like to split my passwords file into multiple “files”, where the unimportant logins are permanently unlocked for convenience, while the more sensitive login credentials remain encrypted until I actually need them.

However, I also am fucking lazy and I know that I won’t be able to keep up with the hassle of keeping multiple passwords files synced. So I wanted to ask if it is possible to keep the convenience of having just a single file that you need to sync, while also making use of the security that splitting up the passwords file brings.

Currently I use KeePassXC on my desktop and KeePass2Android on my phone, but I’d be willing to switch to other software, if the benefits are there.

  • makingStuffForFun@lemmy.ml
    link
    fedilink
    arrow-up
    21
    ·
    vor 3 Tagen

    I just use Syncthing and sync the one keepass file between my laptop, desktop, phone, tablet and server. Too easy. Always available

      • elmicha@feddit.org
        link
        fedilink
        arrow-up
        1
        arrow-down
        1
        ·
        vor 2 Tagen

        I’m using sftp in Keepass2Android to sync the file while I’m at home. When I’m not at home, it uses the local copy on the phone.

        When the password file has changed on my home server and on the phone, Keepass2Android will ask if it should merge the databases. I’m not sure what Syncthing would do in that situation.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    13
    ·
    vor 3 Tagen

    On my computer, I usually have KeePassXC unlocked for the entirety of being logged in.

    Honestly, it sounds like you can solve the issue by only logging in when you need a password and setting the database to lock when minimised or your screen locks.

    Now I know that makes using it more annoying but you can enable quick unlock so after your first login of the day you only have to use a pin or to unlock the database.

  • MalReynolds@slrpnk.net
    link
    fedilink
    English
    arrow-up
    8
    ·
    vor 3 Tagen

    Just use multiple database files (e.g. one for unimportant, one for important) and automate the syncing with syncthing or something so the lazy doesn’t matter…

  • ZeDoTelhado@lemmy.world
    link
    fedilink
    arrow-up
    8
    ·
    vor 3 Tagen

    So what you want to do, effectively, is to have different security requirements for different accounts. Correct? And all in the same file.

    For now I just want to get a few things out of the way:

    • with this strategy, what are you protecting against?
    • how likely is this to happen?
    • what is your contingency plan?

    I believe its good to have different levels of security for different things, but you also have to understand at what cost you need it.

    I can propose a different thing altogether: for the very important passwords, like banks and such, use the pepper method. This means, you have on your password manager part of your password, and a small portion is something you know. Example: generate a 25 chars password, and have at the beginning or end, more 5 chars that you know (can be letters and numbers, and can be something you remember every day, like the first letters of your address plus house number).

    With this approach, there are a couple of benefits:

    • you can still have computacionaly heavy passwords
    • if an attacker gets a hold of your open vault and try to login, it will fail since the password is effectively not complete

    Biggest downside I see is remembering the pepper always. And make sure is not written anywhere. And of course, yo can always argue it is possible at some point to get the correct password with the base password known. But at this point, thus should give you enough time to change it and thwart the attack. Remember: there is no perfect security solution, only sufficiently good ones that can be usable and effective.

  • HubertManne@moist.catsweat.com
    link
    fedilink
    arrow-up
    2
    ·
    vor 2 Tagen

    This is not what you asked but I use bitwarden for unimportant passwords and keypass for important ones. I actually keep the keybase database on an external drive that I only plug in when I use it.

  • Ferk@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    vor 2 Tagen

    Most methods for syncing a file also let you sync a whole directory of files (for example syncthing).

    So if your main issue is keeping them on sync across devices, keep different kdbx files in the same directory and sync that.

    However, I’ve found that switching between databases is not very convenient with most keepass clients. So I tend to only keep separate files when the context is really different and I won’t need to be switching back and forth (eg. personal vs work).

  • ShortN0te@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    vor 2 Tagen

    So I’d like to split my passwords file into multiple “files”, where the unimportant logins are permanently unlocked for convenience, while the more sensitive login credentials remain encrypted until I actually need them.

    And how should that protect you against an attack that has compromised your system? If the system is compromised, then an additional lock does not hinder the attacker to wait until you open it.

    • Quacksalber@sh.itjust.worksOP
      link
      fedilink
      arrow-up
      1
      arrow-down
      2
      ·
      vor 2 Tagen

      The idea is that I’d recognize a compromised system. Not perfect, but good enough. I don’t need to log into my bank account every day. But I will log into lemmy daily. So if a credential stealer + encrypter gets onto my system, I will most likely not have my sensitive passwords stolen. If the malware keeps a low profile, this won’t help, but most malware won’t.

  • Dyskolos
    link
    fedilink
    arrow-up
    3
    arrow-down
    3
    ·
    vor 3 Tagen

    How about a cheaper and easier solution? Get a fingerprint sensor, use this one to unlock the database each time you use it. Fast, comfortable, secure. Got mine directly beside the keyboard.