this post was submitted on 02 Apr 2025
51 points (98.1% liked)

Sysadmin

8469 readers
91 users here now

A community dedicated to the profession of IT Systems Administration

No generic Lemmy issue posts please! Posts about Lemmy belong in one of these communities:
[email protected]
[email protected]
[email protected]
[email protected]

founded 2 years ago
MODERATORS
 

From a simple KeePass database to enterprise credential management solutions—what’s your setup at work?

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 45 points 1 day ago

Not today, Russia.

[–] [email protected] 8 points 22 hours ago

Bit Warden, one password, whatever float your boat just not last pass.

For SHTF stuff GPG.

[–] [email protected] 33 points 1 day ago (3 children)

The method of champions. Post-it on the bottom of keyboard.

[–] [email protected] 18 points 1 day ago (2 children)

Bottom of keyboard? Are you out of space on your monitor to place additional Post-its with user credentials on them? /s

[–] [email protected] 19 points 1 day ago

Boss, I need a third monitor, I'm out of space for post-its

[–] [email protected] 11 points 1 day ago

Monitor bezel is for the less secure systems. Under the keyboard is for the secure stuff.

And the really secure systems are in the filing cabinet.

[–] [email protected] 4 points 21 hours ago

Got a thrift store keyboard. The pink sticky on the bottom said:

User: admin

Pass: password

I wish I was joking. Someone out there was dumb enough to need a reminder on that one.

[–] [email protected] 3 points 1 day ago

I would need a small book hidden under my keyboard. My work password safe has approximately 100 entries.

[–] [email protected] 30 points 1 day ago

more dev than sysop, but: bitwarden

[–] [email protected] 18 points 1 day ago* (last edited 1 day ago) (2 children)

I write it in plaintext then email it to myself. For my email password, I write that down on a sticky note next to my monitor with my webcam pointing towards it with Skype and Zoom always running so I can look at it when I'm not at home. I always make sure to turn 2FA off as well, since that gets annoying and isn't very convenient.

I might choose to mirror the webcam stream to a public RTMP stream later, but not sure yet, since I think that might open up some security holes.

[–] [email protected] 10 points 1 day ago

This is exactly the kind of innovation I was looking for.

[–] [email protected] 3 points 22 hours ago (1 children)

Also, if you use a really easy to remember password... I like P@ssw0rd! Easy to remember, and nobody will ever guess it because, get this... The 'o' is actually a zero!

[–] [email protected] 2 points 9 hours ago

Your password shows up to me as ************

[–] [email protected] 5 points 22 hours ago (1 children)

correct horse battery staple

[–] [email protected] 3 points 19 hours ago

Always a relevant xkcd

[–] [email protected] 4 points 23 hours ago

At work I keep them in onenote (they are encoded) because they won't let us install an actual password manager and half the shit I log into doesn't support SSO/doesn't have it set up and is all on different password schemes. Our service account passwords are in a shared cyberark vault.

[–] [email protected] 4 points 23 hours ago (1 children)
[–] [email protected] 1 points 22 hours ago
[–] [email protected] 10 points 1 day ago* (last edited 1 day ago)

We use Netwrix Password Secure at work. They just announced this week they have found a RCE vulnerability in their software...

[–] [email protected] 8 points 1 day ago

We use PasswordState at work and KeePassXC for personal passwords.

[–] [email protected] 2 points 21 hours ago

Used Keeper at my last gig. Was pretty happy with it all in all. Lacking some admin features, rock and roll support. Not too pricey, but it is per-user/per-month. Played nicely with our Google auth.

[–] [email protected] 6 points 1 day ago

Bitwarden/KeePass for MFA (not SMS or email) protected accounts. Pen and paper stored in a fire proof vault for non-MFA and break glass accounts.

[–] [email protected] 6 points 1 day ago (3 children)

As an admin for a Linux server, I want to institute a ssh pub key expiration policy for all the users and enforce non-reuse of old keys. Does anyone have a best solution for this?

[–] [email protected] 4 points 1 day ago

How do you do your pubkey deployments? If you use ansible, it should be simple enough.

[–] [email protected] 4 points 1 day ago* (last edited 1 day ago)

Sounds like certificates to me, but I don't know of any such solution

Edit: I found out that openssh allows the logon with a certificate. This guide shows how to setup a public key that expires after 52 weeks.

[–] [email protected] 6 points 1 day ago

We use ITGlue because it lets us tie password records to documentation which makes finding things very streamlined.

Personally, I use Bitwarden

[–] [email protected] 4 points 1 day ago (1 children)

Scribbled on the whiteboard in the office.

jk

[–] [email protected] 3 points 23 hours ago

I would never scribble my password on a whiteboard. It's important to write in large clear letters so I can read it from across the lab.

[–] [email protected] 4 points 1 day ago* (last edited 1 day ago)

On a post-it note stuck to the monitor.

[–] [email protected] 5 points 1 day ago* (last edited 1 day ago)

We have a KeePass DB as a fallback but mostly use a PAM solution to manage server access.

[–] [email protected] 3 points 1 day ago

Bitwarden self-hosted with vaultwarden on my Hetzner VPS

[–] [email protected] 2 points 1 day ago

For actual sysadmin stuff? Ansible vaults. Things that are managed otherwise either in ssh blowfish encrypted files or the company 1password thing (not my choice)

[–] [email protected] 3 points 1 day ago (3 children)

I don't understand the extreme love for Bitwarden. I understand it's useful, but I want as few things with a webui and server instance as possible, especially passwords, the thing that should be most secure.

KeePass, vault saved into the user's One Drive synced folder is sufficient. It's secure, offline, and automatically makes backups. And migrates to the new system just by logging into One Drive.

Bitwarden and others worry me because they have a lot of exposed attack surface, comparatively, and require much more maintenance to keep secure imo. I don't want to expose any of that to a portal or anything.

That said, I don't hate Bitwarden, the bitwarden/vault warden software is incredibly solid for what it is.

[–] [email protected] 15 points 1 day ago (1 children)

OneDrive

offline

...shoukd we tell them?

[–] [email protected] 4 points 23 hours ago

You can access it offline.

I do not mean to imply the One Drive is offline. It's the syncing backend.

But if your internet is out, you can still open your vault and look up a router password, for example, because the vault is a file on your local machine.

[–] [email protected] 11 points 1 day ago (1 children)

The actual answer will always be convenience. It’s just too easy to be able to smack my thumb on the fingerprint sensor to login to just about anything.

I understand your point on security, but for the masses, it needs to be as frictionless as possible.

And getting someone to use BW over nothing is a massive improvement even if it’s not perfect.

[–] [email protected] 1 points 19 hours ago

This is incredibly true. The ease of use I will admit got me to use other password managers in the past before I rethought my approach maybe 7 years ago. And any manager is better than the spreadsheet users will implement if we dont give them tools.

[–] [email protected] 11 points 1 day ago (1 children)

https://bitwarden.com/help/cli/

If you’re concerned about security audits they do those regularly too

https://bitwarden.com/help/is-bitwarden-audited/

In addition to free as in source, they are respected because they have a high-quality, certified, third-party audited product.

[–] [email protected] 1 points 23 hours ago (1 children)

Oh certainly. I just mean that in an extremely broad sense, Bitwarden adds 1 more threat vector by being an online service. As a metaphor, if presented with a safety deposit box in a bank, and a safety deposit box in a train station with CCTV, even if the latter is incredibly well defended it still carries more intrinsic risk by being accessible.

That's all really. Bitwarden is great software. It being an online platform just has that inherent factor that a non-web solution doesn't.

Aka, if there is a massive breach in webview or a critical fault in SSL cryptography, this can be exploited. And Bitwarden itself is an attack surface to exploit. But in an offline solution, the attack surface of a vault can only be exploited when you get back online, and somehow actively choose to expose this or have a breach. The reason I use onedrive for the work sync (privately I use syncthing) is it would take two massive simultaneous failures to have an exposure this way. The sync service would have to somehow expose the file to a bad actor, and the file itself would have to have an exploitable cryptographic flaw at the same time.

[–] [email protected] 1 points 22 hours ago (1 children)

Which is why it’s third-party audited every year. It’s transparent for any issues rather than any other solution out there such as OneDrive that obfuscates completely.

[–] [email protected] 1 points 19 hours ago

Absolutely. Like I said: it's great software and they are doing all they can to mitigate the inherent risk it faces because it is one of their biggest attack surfaces. They do great work.

I'm saying I would just rather decouple passwords, and online sync, into two entirely separate sandboxes. For my purposes, I don't need to centrally assign or manage my users passwords from the top down, the manager is a tool for them to use as they like, and they can store PID in there as well, so I shouldn't have access in principle. I can reset the accounts I control, but I cannot unlock or recover their vault.

For a web managed service, through no fault of their own, there is a high likelihood Bitwarden will one day be vulnerable to a browser engine based zeroday at one point or another. And I have no doubt they will rapidly patch this. But it's a matter of time. And bad actors will be constantly attempting to break this quietly.

My only point is, even if onedrive, or GDrive, syncthing, etc, were vulnerable to a similar zeroday, it's not enough to compromise an encrypted vault file because even if an exploit grants access to the file, the KeePass vault management is still entirely separate from all online portions of the interaction, and an entirely different and separate exploit would be needed to exploit the database file if it was obtained, as the vault is not managed in browser.

So there is a much greater chance for me to be notified of a onedrive or syncthing vulnerability, and have time to update the services in my vault contents just in case, well before a brute force attack could (potentially) open it.

This has its own drawbacks, as if they do exfiltrate the file, they can use infinite brute force attacks to break any vault with low enough entropy, but a vulnerability in Bitwarden could expose similar if a bad actor managed to dump the contents.

There is no perfect solution, period. I just wager it's less likely for two zero day exploits to overlap perfectly like that on both my enterprise file sync software and my publically unlisted, undocumented, and otherwise undetectable KeePass Vault file stored in an arbitrary location with an arbitrary name and extension.

[–] [email protected] 2 points 1 day ago

Self-hosted Bitwarden only accessible from behind my self-hosted VPN.

[–] [email protected] 3 points 1 day ago* (last edited 1 day ago) (8 children)

Personally, 1Password, but their enshittifaction is serious.

Work, Password Safe. But we’re moving to CyberArk.

[–] [email protected] 5 points 1 day ago (1 children)

I've been using 1password for over a decade. I'd love to know more about the enshitification you're seeing.

[–] [email protected] 7 points 1 day ago (1 children)

I just looked back and my first vault item dates back to 2010. Time flies.

I think enshittification is slightly an overstatement. They’re under VC pressure now and moving aggressively towards a subscription model with capabilities increasingly behind the subscription. I bought a few licenses for Mac and PC a while ago; the software still works but no browser extensions - need a subscription for that. Also, take a look at their job postings. Same job pays double in USA vs Canada. Funny way to do things if they’re Canadian.

[–] [email protected] 2 points 1 day ago

Thanks for a great response. I've been a paying customer for ages, and added my family as well. So I don't have the paywall issues you're seeing.

load more comments (7 replies)
load more comments
view more: next ›