Readit News logoReadit News
minimaxir · 8 years ago
Previous thread about KeepPassXC 2.2.0: https://news.ycombinator.com/item?id=14633576

I used KeePassXC for a period, but from these release notes, the UI/UX still isn't great. If you're on macOS, I recommend MacPass, which feels more native to the system, is compatible with existing KBDX databases and most-importantly, is also open-source: https://github.com/MacPass/MacPass

vetinari · 8 years ago
I just switched from MacPass to KeePassXC for the reason mentioned in release notes: it obsoletes the HTTP Connector and uses another mechanism. MacPass keeps using HTTP, and it is uknown, when it will do the same switch.

Given that I use multiple computers, and the extensions are synced, I want to use the same mechanism on all of them.

scrollaway · 8 years ago
Do you know the details of the differences between the old and the new mechanisms? All I see is a migration is required, but I used neither.
tripzilch · 8 years ago
I was a little confused by your comment at first, maybe you didn't intend it that way, but I got the impression that you meant MacPass is open source, unlike KeePassXC. Except that KeepassXC is in fact open source: https://github.com/keepassxreboot/keepassxc/

I suppose you meant that MacPass is open source, unlike some other Mac password managers?

I didn't really check until someone downthreads mentioned that KeePassXC is (basically) a superset of KeePassX, which I know is open source because I use it as my password manager. So that means it's time for me to check out KeePassXC :) See what it does for me :)

laurent123456 · 8 years ago
Also macPass is compatible with Keepass database 1.0, unlike KeepassXC.
Florin_Andrei · 8 years ago
You can import v1.0 DBs into the new app.
kuschkufan · 8 years ago
Are you sure? The screenshot at the link URL has a button that suggests at least importing from Keepass 1 is supported.
zaarn · 8 years ago
KPXC is currently my favorite password manager. Much more portable than Keepass itself (Mono, lots of plugins just don't work).

I do recommend that anyone without PW manager atm either try KPXC or Keepass itself. It's worth it for your security.

076ae80a-3c97-4 · 8 years ago
I highly recommend https://keeweb.info/ if you're looking for an attractive, easy to use, cross-platform and Open Source solution. I've been using it on Windows and MacOS for years without any major issues. It's by far the best looking front-end for keepass databases I've seen.
agildehaus · 8 years ago
Unfortunately it's slow as hell. KDBX4 file, ChaCha20/Argon2 30 rounds, that takes under a second to open in KeePassXC took 10 seconds in this app.

Electron apps ...

franga2000 · 8 years ago
I love KeeWeb, especially when used together with Nextcloud. I can access my passwords in a buch of different ways, all synced and all secure (the kdbx has a password and a file key). 1. In KeeWeb from inside Nextcloud (there's an app) 2. In external KeeWeb over WebDAV (great when using it as a PWA) 3. In KeePass proper using desktop file sync 4. In a KeePass-compatible app from the Nextcloud app All of these sound janky, but they work better that any other free software self-hosted cloud password manager.
kayman · 8 years ago
+1 for keeweb. It's central to my password management strategy now. Can't recommend it enough.

I've tried the offline versions, but I find myself often on the go - without my laptop.

The tools for mobile don't seem to support updates - read only. Keeweb does both.

scrollaway · 8 years ago
Since it got a lot of positive attention last time, here's a rough guide on getting started with password management, aimed at readers here who are not currently using a password manager:

https://leclan.ch/password-managers/

TLDR: Download KeepassXC and start using it. :)

zouhair · 8 years ago
What does it do that Keepass/KeepassX cannot do? I looked at their website and nothing new shows up.
scrollaway · 8 years ago
I address that at the bottom of my post. Keepass is the original, KeepassX is the Qt rewrite.

KeepassXC got Qt 5 support, a bunch of misc QOL improvement patches, is actively maintained (unlike KeepassX) and also received some nice extra features such as TOTP 2FA support. It's a superset of KeepassX, so there's no real reason to use KeepassX at this point.

ff_ · 8 years ago
The best UX improvement in this release (IMHO) is pretty buried in the changelog, and I don't see it mentioned here: no more lock files!

If you use Keepass on something like Dropbox it's a blessing.

TacticalMalice · 8 years ago
The mentioned issue has the following statement which makes me wonder whether concurrent use on sync services is supported atm:

> I was going to add tests for "concurrent" access of the same file in phase 2 of these changes. Phase 2 is refactoring the saving process entirely to make it asynchronous and robust to file sync services.

zaarn · 8 years ago
From my experience, it already works somewhat. Atleast, whenever I overwrote the file in Nextcloud and my desktop pulled the update, it would merge the changes automatically.
softawre · 8 years ago
Nice! This was one of two or three reasons I bit the bullet and switched to 1password yearly.
TorKlingberg · 8 years ago
I currently use KeePass2 + Dropbox + Kee (Firefox) + MiniKeePass (iOS). Can KeePassXC + plugins replace those, and what are the advantages?
nwah1 · 8 years ago
The announcement mentioned that they just released a new Firefox addon called KeepassXC-Browser.

KeepassXC doesn't work on iOS. It is just a replacement for KeePass2

StavrosK · 8 years ago
KeePassXC can read KeePass2, so it only needs to replace that. That said, I haven't found a Kee replacement I like, so I'm still on KeePass2 (and it's fine for my needs).
dlandis · 8 years ago
Does anyone know what the license is for this software? It looks like there are NINE different license files in the repo: https://github.com/keepassxreboot/keepassxc

Did they just copy paste every different license they could find into the repo?

th3zero · 8 years ago
KeePassXC maintainer here.

This comment is really funny and made me laugh.

Anyway we are following the Debian guidelines. The full copyright for each component and file is specified in the COPYING file in the root of the repository along side with each author.

pfg · 8 years ago
Not all parts of the source code are available under the same license. The individual source code files include the applicable license. Doing this is fine for compatible licenses and not unusual for projects, though it can make certain things more complicated. Here's an example of what GNU says about GPL compatibility[1] - roughly meaning the whole work is published as GPL.

[1]: https://www.gnu.org/licenses/gpl-faq.html#WhatDoesCompatMean

Jeaye · 8 years ago
https://keepassxc.org/

> The full source code is published under the terms of the GNU General Public License. We see open source as a vital prerequisite for any security-critical software product. For that reason, KeePassXC is and always will be free as in freedom (and in beer). Contributions by everyone are welcome!

Deleted Comment

piracykills · 8 years ago
> Add support for KDBX 4.0, Argon2 and ChaCha20 [#148, #1179, #1230, #1494]

I can finally give this a shot without having to use the weird custom AES-based KDF Keepass used to use. Awesome.

Congrats on the release.

guessmyname · 8 years ago
Last week I started reverse engineering the KDBX 3.1 file format (for fun).

Does anyone knows where is the specification for KDBX 4.0?

EDIT: Found it — https://github.com/keepassxreboot/keepassxc-specs

danesparza · 8 years ago
This link also talks about changes to the spec for 4.x (but in more general terms):

https://keepass.info/help/kb/kdbx_4.html

agildehaus · 8 years ago
I don't believe the XML format has changed at all. Just the key derivation, stream cipher, and some changes to the binary header.
minimaxir · 8 years ago
What are the advantages/disadvantages of using Argon2/ChaCha20 over the current AES implementation? What are good parameters for those algos?
piracykills · 8 years ago
Well, in my amateurish opinion - there was nothing wrong with the existing AES encryption implementation. But they also had a key derivation function based on running many iterations of AES, which was weird and non-standard, I mean it seemed like it would work, but it's not proven in the cryptographic community. Now they've switched to Argon2 which is a very well reviewed KDF and I have a lot more faith in that.

Code for the old KDF is here if anyone's interested: https://github.com/keepassxreboot/keepassxc/blob/7a55ab64d83...