17
4
I'm setting up a KeePass database and it offers the ability to use a key file, which it says is more secure because it can use a longer and more complex password but is easier to break because you only need the key file to open the database. I'll only be using the key file on 2 computers (one desktop and one laptop), wo which is the best option?
Note that it's definitely more appealing to use the key file for me because i have a hard time remembering anything close to a random password.
I keep my key file on a LUKS usb drive, so I need a passphrase to open the usb drive but then only the keyfile to open my passwd db on my laptop. Even if the usb somehow gets stolen with my computer the keyfile is still LUKS encrypted. But that scenario is not as likely as someone simply stealing either one or the other (computer or usb drive), neither of which on its own is any good to anyone, as far as cracking my passwd db. – nanker – 2017-02-11T12:20:39.980
I'd take a look at Steve Gibson's commentary on the matter: http://www.grc.com/sn/sn-182.txt
– jasonh – 2009-08-15T08:12:11.320@jasonh, Wow! you vote me down for suggesting two-factor security, with a
Gibson
interview reference you have taken from his own site (yeah, I've heard Leo before, fine). Please add your points here as a new answer so people can benefit. – nik – 2009-08-15T08:32:10.670@jasonh, Did you actually read the parts in bold? – nik – 2009-08-15T08:45:52.313
7Yes, I did. I understand having a second factor, but it's useless here. The keyfile would be kept virtually with the password database itself if you're a mobile user. If you lose control of the database, you've probably lost control of the key file too. As Steve Gibson notes, a key file isn't giving you much additional security, if any. – jasonh – 2009-08-16T03:14:52.217
2A second factor is useful in the example of the PayPal football. In this case you have a physical device and a password. If your password becomes compromised, there is no reason to believe that your football is missing at the same time by default. In comparison, when the goods are a password database and the securing mechanism is simply another file that resides alongside the database itself, what good is it? None. – jasonh – 2009-08-16T03:16:25.457
@jasonh, I read your comments quite late. But, understood your contention. My expectation is that the key file is either not carried with the DB or is encrypted separately. I agree to the weakness of carrying it in clear with the DB -- the second-factor will be lost. – nik – 2009-09-20T06:21:18.497
2+1 for the use key file and master password. So even if they get the db and key file you just have to remember 1 long password. They cannot hack brains yet so get some torture resistance training instead. – Piotr Kula – 2013-01-16T10:03:40.357
Actually, hacking brains is usually how it is done. I can guess your password, because it is obvious. – ctrl-alt-delor – 2014-01-05T19:33:21.513