this post was submitted on 02 Apr 2025
51 points (98.1% liked)

Sysadmin

8477 readers
45 users here now

A community dedicated to the profession of IT Systems Administration

No generic Lemmy issue posts please! Posts about Lemmy belong in one of these communities:
[email protected]
[email protected]
[email protected]
[email protected]

founded 2 years ago
MODERATORS
 

From a simple KeePass database to enterprise credential management solutions—what’s your setup at work?

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 11 points 1 day ago (1 children)

https://bitwarden.com/help/cli/

If you’re concerned about security audits they do those regularly too

https://bitwarden.com/help/is-bitwarden-audited/

In addition to free as in source, they are respected because they have a high-quality, certified, third-party audited product.

[–] [email protected] 1 points 1 day ago (1 children)

Oh certainly. I just mean that in an extremely broad sense, Bitwarden adds 1 more threat vector by being an online service. As a metaphor, if presented with a safety deposit box in a bank, and a safety deposit box in a train station with CCTV, even if the latter is incredibly well defended it still carries more intrinsic risk by being accessible.

That's all really. Bitwarden is great software. It being an online platform just has that inherent factor that a non-web solution doesn't.

Aka, if there is a massive breach in webview or a critical fault in SSL cryptography, this can be exploited. And Bitwarden itself is an attack surface to exploit. But in an offline solution, the attack surface of a vault can only be exploited when you get back online, and somehow actively choose to expose this or have a breach. The reason I use onedrive for the work sync (privately I use syncthing) is it would take two massive simultaneous failures to have an exposure this way. The sync service would have to somehow expose the file to a bad actor, and the file itself would have to have an exploitable cryptographic flaw at the same time.

[–] [email protected] 1 points 1 day ago (1 children)

Which is why it’s third-party audited every year. It’s transparent for any issues rather than any other solution out there such as OneDrive that obfuscates completely.

[–] [email protected] 1 points 1 day ago

Absolutely. Like I said: it's great software and they are doing all they can to mitigate the inherent risk it faces because it is one of their biggest attack surfaces. They do great work.

I'm saying I would just rather decouple passwords, and online sync, into two entirely separate sandboxes. For my purposes, I don't need to centrally assign or manage my users passwords from the top down, the manager is a tool for them to use as they like, and they can store PID in there as well, so I shouldn't have access in principle. I can reset the accounts I control, but I cannot unlock or recover their vault.

For a web managed service, through no fault of their own, there is a high likelihood Bitwarden will one day be vulnerable to a browser engine based zeroday at one point or another. And I have no doubt they will rapidly patch this. But it's a matter of time. And bad actors will be constantly attempting to break this quietly.

My only point is, even if onedrive, or GDrive, syncthing, etc, were vulnerable to a similar zeroday, it's not enough to compromise an encrypted vault file because even if an exploit grants access to the file, the KeePass vault management is still entirely separate from all online portions of the interaction, and an entirely different and separate exploit would be needed to exploit the database file if it was obtained, as the vault is not managed in browser.

So there is a much greater chance for me to be notified of a onedrive or syncthing vulnerability, and have time to update the services in my vault contents just in case, well before a brute force attack could (potentially) open it.

This has its own drawbacks, as if they do exfiltrate the file, they can use infinite brute force attacks to break any vault with low enough entropy, but a vulnerability in Bitwarden could expose similar if a bad actor managed to dump the contents.

There is no perfect solution, period. I just wager it's less likely for two zero day exploits to overlap perfectly like that on both my enterprise file sync software and my publically unlisted, undocumented, and otherwise undetectable KeePass Vault file stored in an arbitrary location with an arbitrary name and extension.