Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Removing the database does not imply that the functionality must be removed #747

Open
ogarcia opened this issue Dec 31, 2022 · 42 comments
Open

Comments

@ogarcia
Copy link
Contributor

ogarcia commented Dec 31, 2022

The truth is that I didn't quite understand if the announced change is also intended to remove the functionality of being able to connect to a Lesspass API server.

In my opinion, removing that functionality would be a mistake. I think it's right not to provide a centralized service for this, but people in general should not be prevented from setting up their own private server and keeping their settings there as they want.

For example in my personal case I am using my own implementation of the LessPass server which is perfectly valid for personal use and that anyone could set up at home.

I would propose to keep the functionality indicating that if you want you can set up your own local server (commenting the possible risks involved) and even have a list of server implementations so that users can choose how they want to use the system. A Wiki entry could be dedicated to this topic.

@guillaumevincent
Copy link
Member

@ogarcia I don't have a solution for this (yet).

The purpose of this change is to no longer have to maintain code for the connected version.
By keeping the functionalities, I must continue to maintain the containers and the code for the connected part.

I don't want users to set up a LessPass server. They are more in danger than setting up a Birwarden server or using KeepassX or pass.

Maybe I can create a separate repo for the legacy web extension. And let people install this one.

@guillaumevincent guillaumevincent pinned this issue Jan 2, 2023
@guillaumevincent
Copy link
Member

guillaumevincent commented Jan 2, 2023

I'm also ok to display the other servers implementations in the wiki or the connected web extension page.

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 2, 2023

The truth is that I don't see the difference between having your own personal API server where you store the password definitions (which are worth little or nothing without the master password) and making an export of the settings and copying that export to, for example, dropbox.

Both are dangerous in their own way. In fact I personally find the latter more dangerous than the former. And the second is what is likely to happen from the moment that the possibility of having your own server is eliminated.

For me the difference between one and the other lies in the fact that if the API support is removed it is much more cumbersome to keep your information synchronized between different devices.

Remember that whether or not to use your personal API server is an option. If the user wants and assumes the risks of using that option, perfect, if not, then he will use the export or not use anything at all.

Personally I find the functionality very interesting and I do not see that it is a risk to have this functionality, at least not a risk greater than the fact of being able to export the configuration to a file. As I said before, for me the risk is the centralization, that is to say, that all the clients use the same API server.

As for having to continue to maintain the API server implementation. That can be delegated to third parties. Simply set the standard (which is already described here), move the current server implementation to a new repository and indicate that it is an example and let everyone use it at their own risk. You simply maintain the functionality as an API client, which is far less effort than having to support the entire stack.

In short. I would keep the client functionality and leave it up to the community to install, configure or develop their own server implementation.

@guillaumevincent
Copy link
Member

You simply maintain the functionality as an API client, which is far less effort than having to support the entire stack.

Unfortunately that's not true. Most of my dev time on LessPass is for the connected version on the clients.

The truth is that I don't see the difference between having your own personal API server where you store the password definitions (which are worth little or nothing without the master password) and making an export of the settings and copying that export to, for example, dropbox.

I think I was misunderstood. In terms of security, I encourage people to self-host a Bitwarden server rather than a LessPass server. The data is encrypted, there are security audits and it is actively developed.
I don't encourage them to use Dropbox.

LessPass is a static password manager, and it was a mistake to make it look like a normal password manager.

@OlegRakovitch
Copy link

OlegRakovitch commented Jan 3, 2023

Could you please explain what is the suggested way of using LessPass going forward? Are you suggesting to keep password profile in a separate application? Are there any plans to load password profile from a file (or separate application) or is user supposed to manually set options each time he/she wants to login to a website from now on?

@guillaumevincent
Copy link
Member

Could you please explain what is the suggested way of using LessPass going forward?

I recommend using LessPass as a simple deterministic password generator. No password profiles.
If you need to save passwords/credit card/passphrase etc between multiple devices, depending on your technical skills, I recommend using Bitwarden.

The plan is to remove user password profiles.

@np
Copy link

np commented Jan 3, 2023

User profiles are essentials and they make this approach practical.
Could these be stored using Bitwarden?
In Bitwarden we would store the user profile and LessPass would combine it with the master password to generate the final password.
Can we fit a user profile in the size of a password?
The basic process would be able to import a user profile from the clipboard in LessPass.

@guillaumevincent
Copy link
Member

User profiles are essentials and they make this approach practical.

This is because you are using LessPass like a normal password manager.
If profiles are needed, then you should use a more secure alternative.

Bitwarden is just an example.

LessPass should replace user password profiles with community password profiles.
See #534

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 3, 2023

The plan is to remove user password profiles.

The problem with that is that when you have about 500 different logins it is a bit complicated to remember which configuration you have set for each login. On this site had I used symbols? How many times had I rotated the password on this other site?

Leaving lesspass only as a deterministic password generator without anything else would directly kill the project. In fact a deterministic password generator is something as simple as this (with a couple more lines you could include the options of only letters, numbers, symbols, etc.):

read -p "Login? " login
read -p "Username? " user
read -p "Master password? " pass
read -p "Counter? " counter
read -p "Password size? " size

string="${login}+${user}+${pass}+${counter}"
sum="$(echo $string | b2sum | cut -d' ' -f1)"
echo ${sum::$size}

LessPass should replace user password profiles with community password profiles.

These are just the rules that a password must comply with to be accepted by a site. It has nothing to do with the settings you make to generate the password.

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 3, 2023

Moreover, what you propose is already implemented in multiple solutions (with the LessPass algorithm):

And this is just a sample, there are a few more.

@guillaumevincent
Copy link
Member

The problem with that is that when you have about 500 different logins it is a bit complicated to remember which configuration you have set for each login.

You should not remember those configurations. Most of them should be the default one.
Again, if you use LessPass and change the options for each of your passwords, you need a password manager.

In fact a deterministic password generator is something as simple as this

You completely neglect the user experience.

Leaving lesspass only as a deterministic password generator without anything else would directly kill the project.

The future will tell. The safety of LessPass's users is more important than the success of this project.
I no longer want users to use a service that puts them at risk. And I also don't want them to use an alternative that just shifts the problem. The problem is your data is not encrypted. If you need to persist data because of .... then use a more secure password manager.

The other problem is that maintaining a connected version take me a lot of time. I want to simplify by putting this part aside.

I know there will be people who disagree with this decision. As I wrote, it's not an easy decision. But it's mine.

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 3, 2023

Again, if you use LessPass and change the options for each of your passwords, you need a password manager.

The biggest problem is not the options, it's the counter. Personally I usually rotate passwords (just like everyone else I think I should). Remembering which counter I go to for each site is simply impossible.

The other problem is that maintaining a connected version take me a lot of time. I want to simplify by putting this part aside.
I know there will be people who disagree with this decision. As I wrote, it's not an easy decision. But it's mine.

And seek help in the community? I am not a frontend developer and in that part I could not help. But in the backend part (as you can see from my initial comment) if I can make developments to have those parts covered. Like me there are probably many people interested in giving you a hand if you ask for it.

@nicholatian
Copy link

nicholatian commented Jan 3, 2023

You should not remember those configurations. Most of them should be the default one. Again, if you use LessPass and change the options for each of your passwords, you need a password manager.

LessPass provides the conservative minimum of profile management to completely obviate the need for “password managers.” I used LastPass for years, and ditched them over two years ago upon discovering this project and haven’t looked back.

I have to be honest with you, from years of using this with all sorts of quirky websites with Byzantine security policies, including schools, banks, local functions, and government websites, I know for a fact that LessPass is a useless project that is not worth using at all without the configurability. It will simply break upon encountering these sites, and it is a non-starter to simply suggest to users that they take it up with site owners. That’s like stiffing your waiter because you don’t believe in tips – it’s not the users’ fault some websites they use have bad password requirement policies. LessPass should be helping them maximise the amount of password entropy despite that, not casting them aside.

The future will tell. The safety of LessPass's users is more important than the success of this project. I no longer want users to use a service that puts them at risk. And I also don't want them to use an alternative that just shifts the problem. The problem is your data is not encrypted. If you need to persist data because of .... then use a more secure password manager.

The future is now, and I can tell you that if you kill the configurability storage feature outright, it will spell the end of your project. This is a purely technical problem, and while I understand that you have limited time because this was always a volunteer project, it still does not change that fact. LessPass will no longer be if you remove the key feature of coping with the diversity of password policies on the Web.

The other problem is that maintaining a connected version take me a lot of time. I want to simplify by putting this part aside.

I know there will be people who disagree with this decision. As I wrote, it's not an easy decision. But it's mine.

In open source, you can never really kill a project. You only let it live on as far as it’s useful by other names and other maintainers who are more capable than you.

If this change goes ahead as planned, I will have no choice but to freeze updates on the LessPass clients I have and begin working on my own server solution. There’s no practical alternative for me because I need the metadata used to generate my passwords, not the passwords themselves – kind of the whole benefit of using this program! As an aside, it’s kind of terrible that LessPass only offers to export the passwords directly instead of giving me the site metadata so I can import it into an application that can use it.

I switched away from LastPass over two years ago as an enthusiastic early adopter of this app, and I am severely disappointed to find out that it’s liable to come to such an abrupt end like this. It’s all the worse that users are apparently faced with the prospect of data loss with no export option for metadata. All of the talk about user safety just smacks of paranoia – I avoided multiple real data breaches from switching away from stateful password solutions to this. I really had hoped for better.

@guillaumevincent
Copy link
Member

@nicholatian you can export all your data using the lesspass CLI with the --save option

@guillaumevincent
Copy link
Member

I would like the discussion to remain calm. @nicholatian Everything is open source and I spoke about creating another web extension for the connected version. This is not what I called an abrupt end.

quirky websites with Byzantine security policies, including schools, banks, local functions, and government websites

How many of them could be shared among LessPass users?

@edouard-lopez
Copy link
Member

@nicholatian, I understand your disappointment, and we do our best to support our community. Thanks to previous work by @guillaumevincent, you can export your profiles using the python CLI:

Installation

pip install --user lesspass

Usage

⚠️ file are not encrypted, be sure to store them safely.

lesspass --save --prompt

Files will be located in $HOME/.config/lesspass/

Cleanup

rm $HOME/.config/lesspass/config.json $HOME/.config/lesspass/profiles.json

@cristianemenna
Copy link

Thank you @guillaumevincent for all your work on LessPass, it's a great project!
I'm also interested in using the web extension with my server, so I can keep my own database. That why I'd like to understand what makes you to say :

I don't want users to set up a LessPass server. They are more in danger than setting up a Birwarden server or using KeepassX or pass.

Why do you compare the profile storage with other solutions that store the password itself? I can see the problem with the data being saved without any encryption, but it's still only the profile information. Master password only exists in our heads.

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 6, 2023

@edouard-lopez There are many options for exporting profiles, you can use my own client implementation in Rust:

  1. Donwload latest binary from releases or build it.
  2. Run lesspass-client -u [email protected] -p apipass password list -f > /home/user/myconfig.txt.

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 7, 2023

I am happy to tell you that my implementation of the lesspass command line in Rust, lesspass-client is complete. This means that it supports all options. You can list, create, delete, export, import, etc. Exporting and importing is especially useful for the current problem since you will be able to export your data from the official LessPass server and then import it wherever you want. This can be done as follows:

lesspass-client -u [email protected] -p apipass password export - | \
  lesspass-client -s https://my.server.com -u [email protected] -p apipass password import -

Or using a file (take note that files are unencrypted):

lesspass-client -u [email protected] -p apipass password export /tmp/config.json
lesspass-client -s https://my.server.com -u [email protected] -p apipass password import /tmp/config.json

If you do it this way you can make a backup of the exported file.

In addition, lesspass-client has many options, but it is perfectly documented in the help included in the command.

If you find any issue or something that can be improved, open a ticket with no problem.

@theonlyfoxy
Copy link

theonlyfoxy commented Jan 8, 2023

So will Local DB remain functional?
Also instead of exporting passwords from LessPass, why not migrate profiles themselves to Bitwarden? That could be an option.
btw why passwordless managers keep shooting themselves? It seems Spectre is dead too.

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 9, 2023

Also instead of exporting passwords from LessPass, why not migrate profiles themselves to Bitwarden? That could be an option.

They are different concepts. On the one hand Bitwarden stores arbitrary information in an encrypted form with a master password and on the other hand LessPass generates an output from a set of input parameters.

As @cristianemenna commented above, the former has nothing to do with the latter. If someone steals the Bitwarden store sooner or later they could get all your passwords out through a brute force attack (since your passwords are stored in that store). However, with LessPass parameters it will be a bit more complicated. Because, even using brute force the attack, vector is different since the tests would have to be launched directly against a specific site, and not against the storage itself, and it is normal that the specific site blocks the user after a number of attempts.

Personally I am not going to encourage people to migrate from LessPass to Bitwarden for the reasons stated above. In fact before Bitwarden to store encrypted data I would recommend KeePassXC (or any other KeePass implementation) and that the password file never leaves your local machine.

btw why passwordless managers keep shooting themselves? It seems Spectre is dead too.

For now the future of LessPass is under discussion. Possibly as @guillaumevincent has commented it will be split into two parts. On the one hand a simple password generator from input parameters and on the other hand the API client. But well, this is his decision and let him be the one to decide what is best for the project.

As for Spectre, it is actually similar to LessPass with a different algorithm. For now Spectre's functionalities are basic, it is simply a deterministic password generator without any parameter storage function or server API. But this does not mean that Spectre is dead, just that the developer is slowly implementing the features, in fact he recently answered a similar question.

@theonlyfoxy
Copy link

theonlyfoxy commented Jan 9, 2023

Also instead of exporting passwords from LessPass, why not migrate profiles themselves to Bitwarden? That could be an option.

They are different concepts. On the one hand Bitwarden stores arbitrary information in an encrypted form with a master password and on the other hand LessPass generates an output from a set of input parameters.

As @cristianemenna commented above, the former has nothing to do with the latter. If someone steals the Bitwarden store sooner or later they could get all your passwords out through a brute force attack (since your passwords are stored in that store). However, with LessPass parameters it will be a bit more complicated. Because, even using brute force the attack, vector is different since the tests would have to be launched directly against a specific site, and not against the storage itself, and it is normal that the specific site blocks the user after a number of attempts.

Personally I am not going to encourage people to migrate from LessPass to Bitwarden for the reasons stated above. In fact before Bitwarden to store encrypted data I would recommend KeePassXC (or any other KeePass implementation) and that the password file never leaves your local machine.

btw why passwordless managers keep shooting themselves? It seems Spectre is dead too.

For now the future of LessPass is under discussion. Possibly as @guillaumevincent has commented it will be split into two parts. On the one hand a simple password generator from input parameters and on the other hand the API client. But well, this is his decision and let him be the one to decide what is best for the project.

As for Spectre, it is actually similar to LessPass with a different algorithm. For now Spectre's functionalities are basic, it is simply a deterministic password generator without any parameter storage function or server API. But this does not mean that Spectre is dead, just that the developer is slowly implementing the features, in fact he recently answered a similar question.

In my opinion, Bitwarden for storing profiles instead of passwords would be even more secure than hosting your local db, even hosting your profiles db is better than keeping your password in Bitwarden.

BTW as suggestion for LessPass, It would be better if we had a a secret field for each website so even if MasterPassword is leaked, that would prevent from leaking all passwords, As referenced here..

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 9, 2023

In my opinion, Bitwarden for storing profiles instead of passwords would be even more secure than hosting your local db, even hosting your profiles db is better than keeping your password in Bitwarden.

IMHO, it's all about finding a balance between security and usability.

Storing profiles in a local DB with your own personal API server is better than storing them in Bitwarden (in either case). Now, storing the profiles in a personal Bitwarden instance is more secure (and therefore better) than using the local DB with your own API server, but it makes it less usable since you have to manually enter the settings. But in the end it is as I said before. If you are going to store the profiles in Bitwarden you can do it perfectly well in KeePass and you save the process of setting up a Bitwarden infrastructure.

Another option would be to implement data encryption at the client level, so that your API access password (without encrypting it) would be used to encrypt the data. Let me explain.

Right now the API access password is encrypted with LessPass itself and with some fixed parameters so that for the user [email protected] with password 123456 the password used for API access is Kd*ki5i63iN$^z)?V. Even if you steal the database and get the values Kd*k5i63iN$^z)?V and [email protected] you will never be able to find out (without a brute force attack) that his password is 123456, so using the password entered by the user would be perfectly valid. Moreover, you could also encrypt the username and password values before sending them.

The problem with all this is that it would complicate the implementation of the client and you would not have a substantial benefit (always taking into account that the database is local), so we return to the initial problem of cost-benefit.

BTW as suggestion for LessPass, It would be better if we had a a secret field for each website so even if MasterPassword is leaked, that would prevent from leaking all passwords, As referenced here.

You can do that right now by adding the salt to the master password. For example, if your master password is 1234 and you are trying to access Google then you could put as salt goo (the first 3 letters of the login) and therefore use as master password for Google 1234goo.. But this goes back a bit to the other problem with deterministic password generators, remembering what salt you have set for each site.

@guillaumevincent
Copy link
Member

@cristianemenna if you self host LessPass Database and get hacked, you loose all your password profiles. Somebody can craft a service to get a generated password in order to brute force your master password.

If a hacker stole your keepass vault, then a hacker need to bruteforce it in order to find all your passwords.

It's (much) easier to brute force a LessPass generated password than a Keepass vault.

And I know, they need an extra generated password. But other information, like the list of services you use, can be also dangerous. So hosting a LessPass Database server, without any audit, without cryptographic experts work, put you in danger. More than using Keepass

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 10, 2023

It's (much) easier to brute force a LessPass generated password than a Keepass vault.

@guillaumevincent I'm sorry, but I disagree with that statement.

The difficulty (talking about finding the master password) when doing a brute force attack on LessPass, KeePass or even a Bitwarden vault is exactly the same. Now, in both KeePass and Bitwarden when you have found the master password you know it because you are able to read the contents of the vault (and therefore it does not involve anything other than your local machine doing the attack). This does not happen with LessPass, because to know if you have indeed found the correct password you have to try one of the sites you are generating the password for.

Here is an example. On one side I have a KeePass file (the same happens with Bitwarden) where I have stored the access credentials to GitHub and GitLab with the master password ComplexPassword and on the other side I have a LessPass database where I have stored the way to generate those same credentials with the same master password. A brute force attacker if he (or she) gets the KeePass file simply tries until he manages to open the vault, at that moment he already has my access credentials to GitHub and GitLab and he is 100% sure of it because he can read that file. Now, let's say that same attacker gets hold of the LessPass database, the only way he can know if he has indeed found the master password is to generate passwords for the GitHub and GitLab profiles and go to GitHub and GitLab to test if he has found the master password. With the added problem that both GitHub and GitLab will most likely block your user after a number of login retries with invalid credentials.

@tazdij
Copy link

tazdij commented Jan 17, 2023

I would like to second, that leaving the API feature to store ancillary data in a user specified API Server (not centralized) is a major benefit and a feature that I would be upset to lose. In fact, I host my own instance of the rockpass server created be @ogarcia and connect all of my browsers to it.

If you cannot be swayed, please at least create a legacy fork, tag, or branch that we can fork to continue using this feature even after you remove it from your continued development of LessPass.

@guillaumevincent
Copy link
Member

@ogarcia no I compared brute forcing master password to generate one password a hacker stole. Look at the white paper on how KeePass tempered the brute force of the file.

@guillaumevincent
Copy link
Member

@tazdij yes this is the plan

I also thinking about letting LessPass like it is today, and doing full static version with another name.

@ogarcia
Copy link
Contributor Author

ogarcia commented Jan 31, 2023

@guillaumevincent I just realized that with the latest update of the plugin it is not possible to create new accounts, I understand that it is because you do not want new accounts to be created on your server, but by limiting this option you prevent that accounts can be created on other servers.

I don't know if it is possible to change the logic in such a way that if you have configured something other than https://api.lesspass.com on the URL of the LessPass Server option it will allow you to access the account creation.

Many thanks in advance

@nicholatian
Copy link

are there any browser alternatives we can use instead that keep this functionality? it seems we only have about a week left until this app is dead, and I would like to be able to carry on at least on my browsers if not mobile apps too.

@guillaumevincent
Copy link
Member

@ogarcia yes I could bring back the page and make it more user friendly to connect to another server.

@nicholatian what do you mean? The server will be shut down but the clients will remain intact.

@tazdij
Copy link

tazdij commented Feb 23, 2023

are there any browser alternatives we can use instead that keep this functionality? it seems we only have about a week left until this app is dead, and I would like to be able to carry on at least on my browsers if not mobile apps too.

@nicholatian I agree that the lesspass "system" will essentially be dead after the servers are shutdown. However it seems @guillaumevincent will be either leaving a legacy branch or adding the API Server URL back into the settings to allow anyone to host their own API Server and connect the App and Extensions to it.

I am running a docker of rockpass server written by @ogarcia. This is working very well so far. If you do host your own, do take the time to configure all traffic to be HTTPS and you can always utilize LetsEncrypt to get a free SSL Cert.

@tazdij
Copy link

tazdij commented Feb 23, 2023

@nicholatian what do you mean? The server will be shut down but the clients will remain intact.

@guillaumevincent I think you might be underestimating how useless many of us think LessPass will become without some sort of hosted database (The API Server) to store and retrieve the password properties from. I for example, use a random counter value on every single password. If the extension cannot retrieve that number and automatically populate that field in addition to the username and other properties it will be significantly more difficult to use LessPass to help manage all my passwords. And, even more synchronizing this across my various devices and computers. I even install this on my wife's machines so if she needs access to my accounts, (say if I die) she will not have to find the piece of paper in wallet with all those properties written on them ;)

Basically LessPass with its server has been hugely helpful and significantly simplified my password situation, all without ever storing an encrypted form of my passwords. I am very happy you seem willing to retain the server features in the extension (and mobile app?)

I honestly like the idea of a self hosted API Server more than the central one. As long as the extensions retain this feature, I believe this is an improvement.

@nicholatian
Copy link

Yeah, this whole change removing the API does a lot more harm than good. I don’t think anyone would have had an issue if you just had to close the official LessPass API server. I have operated a dedicated server for years because it saves me so much money compared to SaaS solutions, and would have gladly fired one up, but now it’s being killed and I have to seek alternative solutions.

@guillaumevincent
Copy link
Member

@nicholatian please read my post again.

I will leave LessPass intact. On the clients (mobile, web extensions) I will add an additional field to connect to a self-hosted server (today this field is in the settings page). I will put back the account creation page.

If I'm doing a pure static version, I'd use another name. I'm just going to shut the server hosting the free server down.

@nicholatian
Copy link

@nicholatian please read my post again.

I will leave LessPass intact. On the clients (mobile, web extensions) I will add an additional field to connect to a self-hosted server (today this field is in the settings page). I will put back the account creation page.

If I'm doing a pure static version, I'd use another name. I'm just going to shut the server hosting the free server down.

Glad to hear you’re walking it back. I look forward to using LessPass for many years to come.

@tazdij
Copy link

tazdij commented Feb 26, 2023

@guillaumevincent How do you feel is someone in the community were to fork LessPass (Legacy) with the central server or self hosted server capability and continue developing it as a forked project with a new name? You would then be able to continue with LessPass returning it to your original vision, without many of us being left behind. I would think this should satisfy everyone's considerations. Those who want a Stateless Password Manager with a central Options/Profile storage and those who want more a Stateless Password Generator.

Would you be offended if this were to happen, or would you be supportive of this?

@ogarcia
Copy link
Contributor Author

ogarcia commented Feb 27, 2023

@tazdij IMHO, since Guillaume has expressed that he wants to keep this version of LessPass operational (the only thing he is going to do is to remove the central server) I think it would be much better to support the development here than to make a fork of the project.

I imagine that if someone is willing to contribute I don't think they would have a problem with their merge requests being merged.

@OlegRakovitch
Copy link

Thank you @ogarcia for initiating this important discussion, and thank you @guillaumevincent for understanding our needs. I am delighted to know that the LessPass extension and mobile app still support the current ability to store and load password profiles.

I recognize the importance of having a secure storage system for password profiles, especially given the frequency of data breaches. Enabling users to store their password profiles themselves can significantly minimize the impact of such breaches.

@ogarcia, I want to express my gratitude for providing the RockPass option. I find it very helpful, and having it readily available as a Docker image saves a lot of hassle.

Personally, I prefer cloud-native serverless applications because they tend to have integrated solutions for common problems such as SSL offloading, certificate rotation, scaling, deployment, backups, and logs. Therefore, I created an alternative called ServerlessPass for people like me who prefer cloud-native applications. The repository contains a CloudFormation template, making the deployment process very simple. I hope you don't mind me posting the link here.

I've been using LessPass for ages now, and it's a tool that I can't imagine my life without. It's so simple yet so powerful, and it allows me to sleep well at night knowing that my passwords are secure and that I can easily access the password for each website I use. Thank you again @guillaumevincent for developing and maintaining this project.

@ogarcia
Copy link
Contributor Author

ogarcia commented Mar 26, 2023

I'm also ok to display the other servers implementations in the wiki or the connected web extension page.

@guillaumevincent I have just created a new page on the wiki listing the third party implementations that I have tested and know to work. I have also put a link to this new page from the wiki home page. Of course, feel free to modify whatever you consider necessary.

It occurs to me as an improvement that you could put a link to this page from the README in the information section so that people know that although the server is going to be shut down there are other options they can use.

@guillaumevincent
Copy link
Member

@ogarcia yes this is a good idea. Can you send a PR to edit the readme?

@ogarcia
Copy link
Contributor Author

ogarcia commented Mar 30, 2023

Done in #763

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

9 participants