this post was submitted on 08 Oct 2024
165 points (97.1% liked)

Selfhosted

39632 readers
287 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

I'm going to move away from lastpass because the user experience is pretty fucking shit. I was going to look at 1pass as I use it a lot at work and so know it. However I have heard a lot of praise for BitWarden and VaultWarden on here and so probably going to try them out first.

My questions are to those of you who self-host, firstly: why?

And how do you mitigate the risk of your internet going down at home and blocking your access while away?

BitWarden's paid tier is only $10 a year which I'm happy to pay to support a decent service, but im curious about the benefits of the above. I already run syncthing on a pi so adding a password manager wouldn't need any additional hardware.

(page 3) 50 comments
sorted by: hot top controversial new old
[–] [email protected] 17 points 1 week ago (2 children)

My approach to this is as follows:

  • the password manager is probably the most important and often used piece of software I own. We (wife and I share the vault) store everything important/private in there - bank details, hundreds of passwords, passport details, drivers licence etc. It is used many times a day by us both.
  • Loss of control of this data would be catastrophic, so I took its security very seriously.
  • No one company can be trusted with our data, because they all get hacked or make mistakes at some point.

I’m the security dude for a cloud service provider in my day job, so my goal was to use Separation of Concerns to manage my passwords. I therefore split the software from the storage, choosing software from one company, and storage from a second company. That way, it requires a failure on both parties at the same time for me to lose control of all the data.

I used to use OnePass for the software, storing the data in Dropbox. But then they removed that option, so I switched to Enpass. Data is stored in a vault on the local device and synced to a folder on Dropbox, which we both have access to from all our devices (Mac’s, iPads, iPhones). The vault is encrypted using our master password and Dropbox only sees an encrypted file. Enpass provides software that runs locally and doesn’t get a copy of my vault file.

If Dropbox has another failure and the vault gets out, then that is not a problem as long as Enpass have properly encrypted it. If Enpass has a bug making the vaults crackable - again it’s not a problem as long as Dropbox doesn’t lose control of my vault file. I update Enpass, the vault gets fixed and life goes on.

Enpass is very usable, but buggy. It crashes every night (requiring me to start it again and log in), and often loses connection to Safari and wont re-establish it. It got better with a previous update, but has got unreliable again. I’m about to look for another.

Cheers.

[–] [email protected] 9 points 1 week ago* (last edited 1 week ago) (1 children)

Loss of control of this data would be catastrophic, so I took its security very seriously.

Ask yourself: "If my current system is unavailable: How screwed am I?"

If the answer is anything less than "Not screwed at all!", then it is time for a backup - regardless of what system you're using or plan to use.

load more comments (1 replies)
[–] [email protected] 1 points 1 week ago (4 children)

A couple of questions

  1. How do you store a driver's license in Bitwarden? Last time I checked they didn't support file storage. Do you just put it in the cloud storage?

  2. Considering Bitwarden is E2EE, what would be the benefit of storing it at another company in case they are hacked?

[–] [email protected] 3 points 1 week ago (2 children)

How do you store a driver’s license in Bitwarden? Last time I checked they didn’t support file storage. Do you just put it in the cloud storage?

They do support file storage. I've been using that for years for storing small files related to certain accounts an such.

load more comments (2 replies)
load more comments (3 replies)
[–] [email protected] 2 points 1 week ago

I self-host Vaultwarden but I use a VPS where I keep things stable. My VPSes run Debian Stable and have unattended-upgrades installed and configured to automatically install security updates. My home server runs Unraid and is more experimental - I'm not running anything of critical importance on it.

[–] [email protected] 23 points 1 week ago (1 children)

Password management is the one thing i don't plan to self-host, on the grounds of not putting all my eggs in one basket. If something goes wrong and all my shit is fried or destroyed, I don't want to also fuck around with account recovery for my entire digital existence.

Plus, if something is breached, im more likely to hear news about Bitwarden than I am about compromised server and/or client versions in a timeframe to actually be able to react to it.

[–] [email protected] 8 points 1 week ago (1 children)

That's largely why I haven't self hosted either. But problems can be mitigated:

  • regular, automated backups to something else (say, KeePass), encrypted with your master pass and backed up off-site
  • host your PW manager on a VPS, or have the VPS ready to deploy a snapshot from offsite backup
  • change your master pass regularly - limits the kinds of breaches that can impact you
  • randomize usernames - makes it easier to detect a breach, because you can see if any of those were exposed without the org being breached

But honestly, my main reason is that I don't trust my server to stay up 100%, but I do expect Bitwarden to. I also trust their security audits.

[–] [email protected] 15 points 1 week ago (2 children)

I'm self hosting Vaultwarden and my home server got killed by the hurricane, yet I can still access my passwords just fine on the app because it stores them locally encrypted on my phone from the last time it synced. I just can't update or change anything until I can bring everything back on.

So, host your own shit you cowards, it'll be fine.

[–] [email protected] 4 points 1 week ago

I just... don't see the benefit. I host videos so I can access video content even if my internet goes out, and it's a lot cheaper than paying for streaming. I host my own documents because I don't want big tech scraping all my data. I host my own budgeting software, again, because of privacy.

I could host Vaultwarden. I just don't really see the point, especially when my SO and I have a shared collection, and if that broke, my SO would totally blame me, and I don't think that's worth whatever marginal benefits there are to self-hosting.

Maybe I'll eat my words and Bitwarden will get hacked. But until then, stories like yours further confirm to me that not hosting it is better.

load more comments (1 replies)
[–] [email protected] 4 points 1 week ago (1 children)

I recommend against hosting a password manager yourself.

The main reason is self hosted systems require maintenance to patch vulnerabilities. While it's true that you won't be on the main list if e.g. bitwarden gets hacked, your data could still be obtained or ransomed by a scripted attack looking for e.g. vulnerable VaultWarden servers (or even just vulnerable servers in general).

Using professional hosting means just that, professional hosting with people who's full time job is running those systems and keeping people that aren't supposed to be there out.

Plus, you always have the encryption of the binary blob itself to fall back on (which if you've got a good password is a serious barrier to entry that buys you a lot of time). Additionally vaults are encrypted with symmetric crypto which is not vulnerable to quantum computing, so even in that case your data is reasonably safe... And mixed in with a lot of other data that's likely higher priority to target.

load more comments (1 replies)
[–] [email protected] 14 points 1 week ago
  1. Because I don't trust companies to hold onto passwords.
  2. It syncs. I don't need live access to my home.
[–] [email protected] 3 points 1 week ago

you become fully in charge of your passwords instead of relying on someone else

TL;DR:

  • you do it to gain more independence and self-reliance
[–] [email protected] 12 points 1 week ago

I'm on the bandwagon of not hosting it myself. It really breaks down to a level of commitment & surface area issue for me.

Commitment: I know my server OS isn't setup as well as it could be for mission critical software/uptime. I'm a hobbiest with limited time to spend on this hobby and I can't spend 100hrs getting it all right.

Surface Area: I host a bunch of non mission critical services on one server and if I was hosting a password manager it would also be on that server. So I have a very large attack surface area and a weakness in one of those could result in all my passwords & more stored in the manager being exposed.

So I don't trust my own OS to be fully secure and I don't trust the other services and my configurations of them to be secure either. Given that any compromise of my password manager would be devastating. I let someone else host it.

I've seen that in the occassional cases when password managers have been compromised, the attacker only ends up with non encrypted user data & encrypted passwords. The encrypted passwords are practically unbreakable. The services also hire professionals who host and work in hosting for a living. And usually have better data siloing than I can afford.

All that to say I use bitwarden. It is an open source system which has plenty of security built into the model so even if compromised I don't think my passwords are at risk. And I believe they are more well equipped to ensure that data is being managed well.

[–] [email protected] 6 points 1 week ago (2 children)

I evaluated both BitWarden and 1Password for work and 1Password generally won across the board.

If you host yourself make sure backups are rock solid and regularly monitored and tested. Have a plan for your infrastructure being down or compromised.

load more comments (2 replies)
[–] [email protected] 3 points 1 week ago (1 children)

Is there an easy way to export passwords from LastPass to another service, self-hosted or otherwise? I’ve been wanting to move away from my current manager but have been reluctant due to this.

[–] [email protected] 4 points 1 week ago* (last edited 1 week ago)

Yes. It has been a while since I moved (whenever the first breach was), but I exported from lastpass and imported to Bitwarden with minimal issue, I think I had to add a column.

[–] [email protected] 1 points 1 week ago (2 children)

Self-hosting removes the risk of somebody compromising Bitwarden’s servers and adding malicious javascript to send off your master password to a bad actor instead of just processing it locally like it’s designed to.

load more comments (2 replies)
[–] [email protected] 6 points 1 week ago

Bitwarden's free version is enough for my purposes, but I didn't realize they had a $10/yr plan. That seems worth paying for, I'll have to look into it.

[–] [email protected] -3 points 1 week ago

I still just use :X with vim on a server I can ssh to.

[–] [email protected] -4 points 1 week ago (6 children)

My questions are to those of you who self-host, firstly: why?

Would you give me your password database? I promise to encrypt it!

load more comments (6 replies)
[–] [email protected] 3 points 1 week ago

I self host services as much as possible for multiple reasons; learning, staying up to date with so many technologies with hands on experience, and security / peace of mind. Knowing my 3-2-1 backup solution is backing my entire infrastructure helps greatly in feeling less pressured to provide my data to unknown entities no matter how trustworthy, as well as the peace of mind in knowing I have control over every step of the process and how to troubleshoot and fix problems. I’m not an expert and rely heavily on online resources to help get me to a comfortable spot but I also don’t feel helpless when something breaks.

If the choice is to trust an encrypted backup of all my sensitive passwords, passkeys, and recovery information on someone else’s server or have to restore a machine, container, vm, etc. from a backup due to critical failures, I’ll choose the second one because no matter how encrypted something is someone somewhere will be able to break it with time. I don’t care if accelerated and quantum encryption will take millennia to break. Not having that payload out in the wild at all is the only way to prevent it being cracked.

[–] [email protected] 27 points 1 week ago (2 children)

I'm self-hosting a VaultWarden install, and I'm doing it because uh, well, at this point I've basically ended up hosting every service I use online at this point.

Though, for most people, there's probably no real reason to self-host their own password manager, though please stop using Lastpass because they've shown that they're utterly incompetent repeatedly at this point.

[–] [email protected] 1 points 1 week ago (1 children)

Just curious, how do you host it? Do you have it containerized or no?

[–] [email protected] 1 points 1 week ago

Yeah, I run everything in containers, minus a couple of things like the nginx install that's doing reverse proxy work.

[–] [email protected] 3 points 1 week ago (1 children)

Yeah I will likely move away.

My understanding with lastpass was that they had a breach but only encrypted data was stolen? What did I miss?

[–] [email protected] 6 points 1 week ago (1 children)

It was, IIRC, 3 separate breaches, plus a situation where the default KDF iterations on the vault was set to low as to actually make said encrypted data crackable.

The last I don't really blame them for necessarily, but rather shows that they weren't paying any attention to what their platform would actually protect against and what the threat landscape was and thus they never increased it and worse, when they did, they didn't force older vaults to increase it because it would be mildly inconvenient to users.

Basically, just a poor showing of data stewardship and if there's ONE thing you want your password manager to be good at, it's that.

load more comments (1 replies)
[–] [email protected] 3 points 1 week ago* (last edited 1 week ago) (1 children)

Lots of people like and recommend Bitwarden. I think followed by KeePass on second place.

I self-host stuff because I can, because I learn something while doing it and it gives me control. And I'm running that server anyways, so I might as well install one more service on it. If you don't want to spend your time managing and maintaining servers and services, go for the official (paid) service. That'll do, too.

If you're worried about your internet connection going down, either use a VPS in a datacenter or just use software that syncs to your devices. I think Bitwarden does that, your passwords will be available without an internet connection to your server. They just won't get synced until the server is reachable again.

[–] [email protected] 3 points 1 week ago (3 children)

Thanks, I did consider the syncing would be fine. But if the reason to do it is just hobbying then I'll pass, I have too many hobbies at this point and managing what I'm already hosting is giving me enough of a scratch for that itch

[–] [email protected] 3 points 1 week ago

I run vaultwarden in a docker container and I can't say I've touched it since then. Its as much maintenance as all the other services I run. Reboot the server quarterly to make sure patches are applied. Docker containers patch nightly.

load more comments (2 replies)
load more comments
view more: ‹ prev next ›