pam-duress
KeePass2.x
Our great sponsors
pam-duress | KeePass2.x | |
---|---|---|
18 | 315 | |
1,315 | 292 | |
- | - | |
1.5 | 2.9 | |
12 months ago | 3 months ago | |
C | C# | |
GNU Lesser General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pam-duress
- Delete files upon entering a certain password?
-
French Supreme court: Refusing to provide your phone password is a crime.
On Linux, there’s pam-duress: https://github.com/nuvious/pam-duress
-
vault timeout options
Multi-step timeout would be a good alternative, especially for mobile. For desktop, I have this awesome PAM set up to remove everything associated with my regular user account.
-
Quick Tip: Enable Touch ID for Sudo
It's actually quite simple and readily available with PAM duress [0] (at least on Linux, I'm not sure about PAM on Mac). It was also discussed here already [1]. Still, you should consider that doing so might not work in your favor.
[0] https://github.com/nuvious/pam-duress
[1] https://news.ycombinator.com/item?id=28267975
-
Help with pam, specifically pam_duress
# Copyright 1999-2022 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 EAPI=8 inherit pam toolchain-funcs VER_COMMIT="04e607f9ab674c8dbbf27ea8bb59158178a72f69" DESCRIPTION="A PAM module enabling special 'duress' passwords that will execute arbitrary scripts" HOMEPAGE="https://github.com/nuvious/pam-duress" SRC_URI="https://github.com/nuvious/${PN}/archive/${VER_COMMIT}.tar.gz -> ${P}.tar.gz" LICENSE="LGPL-3" SLOT="0" KEYWORDS="~amd64" IUSE="debug" DEPENDS="dev-libs/openssl sys-libs/pam" RDEPENDS="${DEPENDS}" S="${WORKDIR}/pam-duress-${VER_COMMIT}" src_prepare() { default sed -e "/^CC :=/s|:= .*|:= $(tc-getCC)|" -e "/^CFLAGS :=/s|-O2|${CFLAGS}|" \ -i Makefile || die } src_compile() { emake $(use debug && echo "debug") } src_install() { dobin bin/duress_sign dobin bin/pam_test dopammod bin/pam_duress.so einstalldocs }
-
Dead Man's Switch?
Using https://github.com/xmidt-org/dms & https://github.com/nuvious/pam-duress to shred LUKS headers: https://www.buskill.in/luks-self-destruct/
-
self destroying luks?
maybe https://github.com/nuvious/pam-duress
-
can you set up a locking manager so when you log in with specific username/password it doesnt let you in and just takes a photo?
This repo gives you one such tool. It triggers a script when a specific password is used, and can then hand over control to the usual unlocking process or not (as you asked for). The script is whatever you want: taking a pic, maybe transmit it over the internet, possibly including live video, audio and location, distress message, etc. The script can also erase the app, itself and the log entries, then unlocking as if nothing had happend. A downside is that, at least from the repo description and instructions, the Duress action triggers on specific user and password, not on anything but the correct combination. Still, you asked for specific user and password.
- Use secondary login password to trigger selfdestruct
-
Is it possible to enter fake pin code to "unlock" phone/computer?
So far, I've only come across one solution for Linux, called PAM Duress. It executes a script when you log in, so you'd probably need to add some actions that make the files unavailable. I haven't used it myself, as I'm a Windows user.
KeePass2.x
-
Ask HN: Why do people use Password Managers?
And the best part is there are solutions already that do this: https://keepass.info/
Does it work on Android or iOS?
-
Passwords vs Keys
🔗 KeePass
-
Google-hosted malvertising leads to fake Keepass site that looks genuine
When you're at a point where you're relying on a display name to make security-critical decisions, you've already lost.
Character substitutions like ķeepass or ƙeepass or keypass are at least possible to spot if you know the name of the product, but not the full URL.
But there are many ways to create lookalike domains that don't change the product name: https://keepass.org https://keepass.net https://keepass.info https://keepass.cx https://keepassxc.org https://keepass-info.net https://keepass-manager.com
Which of these is the correct one? (It's https://keepassxc.org of course, but just looking at the URL won't tell you that.)
The root cause is downloading software you see advertised on Google even though that does not in any way establish trustworthiness.
-
Google announces passwordless by default: Make the switch to passkeys
> People love to hate on passwords but the reality is that for many circumstances (threat models) they are the best compromise. You can make them more than strong enough (take 32+ bytes out of /dev/random and encode however you like, nobody will ever brute force that in this universe) and various passwords managers solve the problem of re-use (never reuse a password).
> And it comes with the benefit that you control how it is stored and can apply as much redundancy as you want to feel comfortable.
Honestly, I agree! I used KeePass back in the day (https://keepass.info/) but now use KeePassXC (https://keepassxc.org/) and it's really nice - I don't know any of my passwords because they're all randomly generated and are pretty secure. The only one I have to remember is my main password for decrypting the safe, which I also wrote down and entrusted to someone close to me due to its complexity.
It honestly works great, software to interact with the password safe is on every platform where I need it to be, in addition to it being super easy to reason about storage, because it's basically just a file - that I can then put on self-hosted Nextcloud, or another solution like that, or USB sticks or burn to CDs for all I care.
Maybe I should also migrate all of my TOTP stuff over to it and look into good Android apps at some point, then I wouldn't quite need Google Authenticator or FreeOTP anymore, either.
-
If you cannot download any books, then you’re on one of the scam sites
If you have used this combo at many sites (which is of course not recommended) then download one of the available free Password Managers like Keepass, Bitwarden, Lastpass or any others you can find with a Google Search
-
Your privacy is optional
I also tried out KeePass for a little bit but prefer the BitWarden apps. The key thing here is don't store your passwords in the cloud as they are massive target for hackers.
-
Best AUTOFILL plugin?
There are various Keepass add-ons, but I prefer the standalone version.
- Password manager
-
KeePass vs VaultWarden
Best KeePass Windows desktop client: KeePass
-
My privacy journey -thanks to this and r/privacy sub AND how can I make it better
If though you can't stand the idea of your password vault on a 3rd party server then you can use an offline password manager like KeePass. Of course, you have to take responsibility for making and storing backups of your vault in case something happens to your device. Fortunately, Syncthing can make this pretty trivial.
What are some alternatives?
obs-studio-node - libOBS (OBS Studio) for Node.Js, Electron and similar tools
keepassxc - KeePassXC is a cross-platform community-driven port of the Windows application “Keepass Password Safe”.
pam_duress - A pam module written in C for duress codes in linux authentication
KeePassDX - Lightweight vault and password manager for Android, KeePassDX allows editing encrypted data in a single file in KeePass format and fill in the forms in a secure way.
WSL-Hello-sudo - Let's sudo by face recognition of Windows Hello on Windows Subsystem for Linux (WSL). It runs on both WSL 1 and WSL 2. This is a PAM module for Linux on WSL.
vaultwarden - Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
tc-play - Free and simple TrueCrypt/VeraCrypt Implementation based on dm-crypt
Strongbox - A KeePass/Password Safe Client for iOS and OS X
Wasted - Lock and wipe on emergency.
Bitwarden - The core infrastructure backend (API, database, Docker, etc).
packages
KeePassWinHello - Quick unlock KeePass 2 database using biometrics with Windows Hello