Yes. But do we actually need more? Because more sophistication means more management compexity.
True. Letâs dig into what we really need.
Today, when a connected browser/whatever requests access to a website creds, KeepassXC (2.3.4 in debian-10) shows a window with the plugin name (âKeepassXC-Browserâ and the website, but not the connector name (eg. âwork/firefoxâ). If it was showing this (more recent versions maybe do ?) it could even be sufficient for my own use. But even this lack of label can be mitigated by an âaskâ qrexec policy.
So do we really just need to setup a socket proxy ?
lsof
on it reveals several UNIX sockets but no obvious way to know whatâs what. Iâd say looking into a small client like keepassxc-proxy-client ¡ PyPI may be the best way to find out.
The latter wants to use $XDG_RUNTIME_DIR/org.keepassxc.KeePassXC.BrowserServer
, but that one does not exist here. Other sources mention $XDG_RUNTIME_DIR/kpxc_server
which does exist here.
BTW, there was another thread on this subject some time ago - not about KeepassXC itself though:
Ok guys I got it working. May need a bit more debugging but thatâs it.
Speaking on password sharing control, I think if we want to modify KeepassXC to make some passwords shareable to the browser while some are to be local-only, tags or groups are apparently the proper way to control that because we need to maintain compatibility with other clients. But need to patch KeepassX for that anyway.
Thatâs nice! Now I have:
single gpg backend for all qubes thanks to split-gpg
single smartcard backend
single u2f backend
single password manager
I would like to share how im using keepass.
I have a local-admin appvm, which syncs my keepassdb via syncthing with my NAS and phone, all local /vpn. And a second keepassdb local, in vault. No net.
Only using dispvms for online activities.
would you feel comfortable if the âsharedâ keepass db would be accessible via browser extension?
Congrats. Are you going to share a howto for this? :)~