Jump to content
Enpass Discussion Forum

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General discussion
    • Hot topics
    • Enpass Support & Troubleshooting
    • Registration and Purchases
    • Autofilling and Desktop Browser Extensions
    • Data Security
    • Announcements
  • Help us improving Enpass
    • Feature requests
    • Enpass Beta
    • Localization
  • General discussion

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. I've just found enpass and love it, it's a first class app. One feature that I would find useful would be to remote wipe a device. Perhaps something could be stored in the shared file to force a wipe and block devices for extra security. Thanks Rich
  2. Hi there, i start using Enpass and its great, but found some shortcoming here and there, so willing to give feedback. 1. Copied data through browser extension ( chrome extension) does not auto clear as it works inside Enpass main desktop application. 2. While generating a new password, there is one option only i.e. "Fill and copy" and as is said in my first point, data don't get auto cleared, so its a problem, as you know clipboard is not a safe place for sensitive data. I don't prefer copy-paste data when we are dealing with sensitive data. Instead of this, there should be a "Fill only" option to inject password directly without using clipboard and this will be more secure as compare to current approach. Frankly speaking, I like Lastpass approach at this point. Data filled without copying to clipboard and Lastpass even eliminate the need of copying old password manually while changing password where u need to put your old password (Enpass do need copying old password manually while changing passwords like facebook which need old passwords for changing but that's acceptable to some degree, after all, its an old password). This don't mean that am here to promote Lastpass here, Lastpass is not most perfect itself. Even i use Enpass over Lastpass because i like Enpass more than that. But looking at goods of other is not a bad habit as it help us to improve. I really hoping that these points will be considerable in future update. Thanks, Have a nice day.
  3. Hi everyone, on Enpass 5.5.6 (Linux) I noticed that the password generator uses exactly the configured number of characters per type (i.e. digits, uppers, symbols) and I found no way to specify an "At least #" logic. For example, using the default configuration the 18-chars password always has 3 digits, 5 uppers, 5 symbols (and 5 lowers, even if not stated), whereas I want it to have a minimum of 1 character per type, as required by most password policies out there. I would even deem this default configuration a security bug because by greatly reducing the cardinality of the password space you gives an obstinate cracker a sensible advantage. Is there a way to enable the "At least #" logic? May we expect a more robust password generator in the upcoming release?
  4. Hi, I recently found a file named data.xml in my enpass directory. What is that for? And why the hell, it contains my email credentials in PLAINTEXT?
  5. Just wanted to get a hint on how everybody else is using Enpass and at the same time show my setup. I use an USB-wristband for portability. I've got one layer of bitlocker using aes128 autounlock with tpm) and within that the walletx with its own aes256. Instead of the Enpass Portable I've got Enpass desktop installed on my three PCs pointing to an USB drive. That way I split up meta settings for Enpass in the registry and vault on a removable drive. Also when frequently synchronizing, the performance is better when executables that aren't secret reside on a local drive. I use cloud sync, so local backup isn't necessary. I only mount the USB stick and vault when required, and never run Enpass in the background. Critical secrets like Google or Microsoft are not stored in the vault, only their TOTP.
  6. An interesting and important question that was already raised, but not yet answered, in another thread: Is Enpass' built-in password generator part of SQLCipher or otherwise (if yes, how so?) open source and therefore trustworthy? I currently feel no need to demand to make the whole application open source as long as the security-relevant parts are. But the password generator is one of these and therefore a reassuring answer would be nice. If it's not open source, what are the plans in that regard? If it is, I think you should advertise that on your website, too.
  7. I recently came across this article: Password managers: attacks and defenses -- FEBRUARY 6, 2017 found here: https://blog.acolyer.org/2017/02/06/password-managers-attacks-and-defenses/. It describes common password attacks on password managers, mostly surrounding "autofill." For example, "The evil coffee shop attacker," "Sweep attacks," "Injection," and so forth. It lists several password managers like the big browsers (Chrome, Safari, etc.), Lastpass, 1Password, etc. It does not mention enpass. I would like to know if these types of autofill security concerns have been investigated and addressed in enpass. Thank you.
  8. Just a thought I'd like to share. With the introduction of time-based OTP in Enpass, you are able to use your one-time passwords from within the Enpass client. While this saves time for browsing to another OTP client (such as Google Authenticator), it does decrease the level of security. One-time passwords are usually used as the second factor of two-factor authentication. In most cases, these two factors are 'something you know' (your password) and 'something you have' (your phone with the OTP app on it). With the integration of OTP in Enpass, these two separate factors become one as they are both 'something you know/have/stored in the Enpass database'. Have you considered this decreased level of security? I know using OTP in Enpass is optional and the chance of someone obtaining and cracking the SQL database is low, but still the principle of two-factor authentication is thrown out the window by storing both your password and OTP in one place.
  9. Hi, I set up Enpass using WebDAV authentication, and that seems to work fine. However, I am currently trying to configure it for my iPhone as well, but this fails. On the iPhone, the Enpass app gives the error "Authorization failed" even with the correct URL, username and password. my server logs give the following details: Enpass on iPhone: [error] Digest: client used wrong authentication scheme `Basic': /webdav/enpass/ As you probably know HTTP supports both Basic and Digest authentication. Basic is unencryted, Digest uses a hash. So it seems that the MacOS version does support both Basic and Digest authentication, but the iPhone version only Basic authentication. I will configure my server to allow Basic authentication. While Basic authentication does not encrypt passwords, it is fine, as long at HTTPS is used (if HTTP would be used, the password would be send in plain text on the Internet). Now I have three suggestions for improvement: Support HTTP Digest WebDAV authentication on iOS. I assume all libraries support both (the Digest protocol was published 1999, the Basic protocol is even older) Only support HTTPS protocol, not HTTP (in case that is not already the case). Alternatively, if you prefer to still support HTTP, ensure Digest encryption is used. Let the user explicitly choose the authentication scheme: Digest, Basic, or Digest with Basic as fall-back.
  10. I started using Enpass yesterday and so far I absolutely love it. Only one thing surprised me so far: when I lock the screen in Ubuntu 16.04 (CTRL + ALT + L), Enpass will stay unlocked. I find it impractical to lock Enpass separately. I'd like Enpass to lock itself when the system is locked. Or at least I'd like to have a setting for this. Thanks for consideration!
  11. I exported 500+ RoboForm entries to a html file. I imported them to Enpass. Security in Enpass is set to obscure passwords. Instead, they are all visible. True for Desktop, Win10, and Windows Phone 8.1
×
×
  • Create New...