Are default settings enough or should be modified?
Well where do you store your database?
Default database encryption settings provide a high level of protection against decryption - and it is adequate for cloud storage (OneDrive Personal Vault).Are default settings enough or should be modified?
As far as I know, KeePass (the original) is very secure, and KeePassXC is even more secure by default, so it is more than enough.
Even if it is stored online, it is very well encrypted. I have stored it on my OneDrive account, and it syncs automatically, so there is no need to worry as long as the password is strong.Well where do you store your database?
If you store it locally then no need to worry at all.
Yes, locally.Well where do you store your database?
If you store it locally then no need to worry at all.
Then don't be paranoid my friend.Yes, locally.
If you're storing the database online then you'd better use a key file alongside the master password.Even if it is stored online, it is very well encrypted. I have stored it on my OneDrive account, and it syncs automatically, so there is no need to worry as long as the password is strong.
Keepassxc has the option to change from Argon2d to Argon2id; I was asking about the default settings to find out if switching to Argon2id is more secure.but for Argon2id
I do not use the "basic" KDF (used by 7Zip) as it is the weakest compared to Argon, or even Serpent (of PeaZip).beyond a "basic" KDF
I use password only, but it is labeled secure by both Keepassxc and Bitwarden password generator website.Passphrase Cracker Comparison
I used to change the memory fo PeaZip when creating password protected pea file from 64 MB (default) to 1 GB (which increases the time for encryption and decryption on my PC from 2 seconds to approx 16); should I do the same for Keepassxc?Therefore, you should increase the m parameter as well
They advertise Argon2d as good for GPU cracking, and Argon2id as hybrid resistant to both GPU cracking and side-channel cracking (presumably a malware trying to find information leaks from your KDF computation). I personally thought either option was okay, but I picked Argon2id (for KeepassXC) because Bitwarden chose it, and there are more posts (around Bitwarden) discussing it.if switching to Argon2id is more secure.
Basic KDF for password managers recommended by NIST includes 600,000 rounds of PBKDF2. Both configurations of Argon2 that we talked about already exceed that."basic" KDF
is labeled secure
I would. If it takes too much time, reduce the rounds. The recommendation for tweaking Argon2 parameters is to maximize memory usage, increase the rounds to extend the time, and increase parallelism to reduce the time (you can increase it up to the number of cores multiplied by 2, usually).should I do the same for Keepassxc?
Agree, but such randomly created password is almost impossible to memorize, especially for someone with Parkinson diseaseonly "cryptographically" random generation counts for anything to get reliable password entropy
After increasing memory from 64 to 1024 MB and threads from 2 to 8, and clicking benchmark for 1 second, I got rounds reduced from 38 to 2; is 2 good or better to re-increase it? and increase to how much?The recommendation for tweaking Argon2 parameters is to maximize memory usage, increase the rounds to extend the time, and increase parallelism to reduce the time
For transparency, mine is set to Argon2id, t=5, m=1024Mib, p=8.is 2 good or better to re-increase it? and increase to how much?
Such settings have increased unlocking time from 1 to approx 6 seconds, which I find reasonable.For transparency, mine is set to Argon2id, t=5, m=1024Mib, p=8.
I would set t to at least 3 to match a standard doc. I in fact would set t to as much as I can stand waiting for the unlock. Currently, my unlock time is around 2s on an Intel Core i5-12500T with 6 cores.
For Bitwarden, mine is set to Argon2id, t=3, m=256MB, p=8. On the slowest device (Android), the unlock takes 3 seconds.
And he is storing the vault offlineI hope just reading the configuration will discourage all those who try to crack your KeepassXC vault! May the force be with you.
Uninstalled KeepassXC; needs VCRedist and I do not like apps with extra dependency.And he is storing the vault offline![]()
Btw a password manager provides protection against many scenarios.Uninstalled KeepassXC; needs VCRedist and I do not like apps with extra dependency.
Credentials in doxc file stored in Pea file encrypted by triple alogrithm (AES, Twofish, and Serpent 256) using scrypt as KDF.
Of course, it has a stronger KDF (Argon 2), but scrypt is not weak either.Btw a password manager provides protection against many scenarios.
Keepassxc uses AES 256 and Argon2; PeaZip uses AES 256 also (in addition to two extra encryption alogrithms) and scrypt (the second rank in strength for KDF after Argon2, both are stronger than PBKDF2 used by 7-Zip and Winrar).I do tend to agree with @Divine_Barakah. KeePassXC's main reason for being is to protect your credentials against different scenarios that could compromise your secrets. Other methods are obviously possible, especially if you avoid malware, phishing, scams, and users' mistakes.