Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unsupported Legacy Key File Format ? #1549

Closed
repsorp opened this issue Feb 28, 2018 · 10 comments
Closed

Unsupported Legacy Key File Format ? #1549

repsorp opened this issue Feb 28, 2018 · 10 comments

Comments

@repsorp
Copy link

repsorp commented Feb 28, 2018

This message when opening KeePassXC 2.3.0 :

kesspassxc

What would be the best way to generate a new supported key file ?

Operating system: Ubuntu 16.04

@phoerious
Copy link
Member

You can go to Database/Change Master Key and then click on "Generate new key file" or simply use any other file with enough random or pseudo random data that only you own and nobody else.

@rominf
Copy link

rominf commented Mar 5, 2018

I want to reopen this. This is not a bug, but a usability feature. Normal users care only about passwords, not about infrastructure. IMHO, the new key file should be generated automatically in place without any confirmation, because for a normal user it should be a black box and "it just works".

@phoerious
Copy link
Member

I disagree with automatically regenerating the key file. It's like changing the password automatically without telling the user. Imagine we regenerate it at the user's home computer and then they go to work, update their database from Dropbox and can't open it anymore, because the right key file is at home.

@RealOrangeOne
Copy link
Contributor

Most people choose not to sync the key in the same way they sync their database. I personally sync my database with Nextcloud, but manually install my key onto each device, which works very well for me. I spent some of this weekend upgrading to 2.3, and wrote up some documentation on it, including generating a new key: https://theorangeone.net/posts/keepassxc-2.3-migration/#new-key-files

@TheZ3ro
Copy link
Contributor

TheZ3ro commented Mar 5, 2018

I agree with @phoerious, users must have infrastructure/organization in place before using keyfiles otherwise they will lose access to their passwords' database

@affinityv
Copy link

affinityv commented May 7, 2018

Why can't the "original" key files co-exist? I like the possibility to not tie down my database to a single software base; I came from KP2 on Winblows, will the new key and current database work in Windows, or am I locked in to KPXC only now?

@TheZ3ro
Copy link
Contributor

TheZ3ro commented May 7, 2018

Nope, the new keyfile is supported in KP2 as well

@droidmonkey
Copy link
Member

The new key works everywhere

@affinityv
Copy link

Okay, great. I thought that a file, any file or even multiple files could already be a "key file"; but the "legacy" xml version does things differently because it has a special format?

@phoerious
Copy link
Member

Yes. There are various different key file formats for storing fixed-length secrets. If a key file is used that is in none of these formats, then the hash value of the whole key file is used, which is, in our opinion, the most sensible way of using a key file.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants