Hacker News new | past | comments | ask | show | jobs | submit login

Use KeePass + DropBox or a network share. That's what my company does. KeePass is really solid software.

http://keepass.info/




Keepass has two levels of access control: "you can access this database" and "you can't". You can use a single database per access group, but once you go beyond two or three groups that's infeasible. You really need a system with a highly granular ACL built-in.


In this sense does anyone know if KeePassX is any good?

I'm interested in password storage but I have both windows and linux machines.


Works well for me - we then sync our password file between us using Dropbox. It creates a lock file that also syncs and stops multiple people from editing simulaneously and messing things up.


I don't have Windows, but use KeePassX and KeePassDroid to share the password DB between Linux and my Android phone (via Dropbox) and it works great.


I've been using it for the past 2 years on a Linux box, it's rock-solid and format-compatible with KeePass 1.x


For extra safety, go to the database settings and tell it use 2148000000 rounds for the master password.


I've been using 1Password's beta for Windows[1]. Anybody know if it's got any problems like this?

[1] http://agilewebsolutions.com/onepassword/win


Been using 1Password across a PC and a couple of Macs myself and I love it.

As per [1] their data format is pretty open and based on the OSX Keychain format. Uses PBKDF2 to generate unique salts/encryption keys per password. Like any password management system, if you lose your master password, you’re still screwed… But (format being open and based on solid standards) it doesn’t appear (to me [2]) to be vulnerable to a similar attack (i.e, an unintentional backdoor password of sorts).

The Windows version must use some implementation of the same backend, since the data file works across platforms (they’re big on the Dropbox sync support).

[1] http://help.agile.ws/1Password3/agile_keychain_design.html

[2] i.e., with my limited experience with information security, knowledge of some best practices for password storage, and my interpretation of the data format




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: