Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Store secrets using Secret Service API on Linux #32845

Open
septatrix opened this issue May 14, 2024 · 3 comments
Open

Store secrets using Secret Service API on Linux #32845

septatrix opened this issue May 14, 2024 · 3 comments

Comments

@septatrix
Copy link

Is your feature request related to a problem? Please describe.
Currently secrets are not handled well which results in poor security.

Describe the solution you'd like
Most password managers on Linux provide a standardized interface using the Secret Service API.
These interfaces should be used to store passwords in the system keyring resulting in a more secure solution and also improved user experience.

Describe alternatives you've considered
Preserving the status quo: This is less secure and thus not an option.
Using some other API: There are non that I know of under Linux.

Additional context

@ShadelessFox
Copy link
Member

Hello @septatrix,

Currently secrets are not handled well which results in poor security.

Can you please elaborate? Have you considered using the master password?

@septatrix
Copy link
Author

Currently secrets are not handled well which results in poor security.

Can you please elaborate? Have you considered using the master password?

They still require a password input which is vulnerable to keylogger. But my main argument is also regarding user experience. For Windows and macOS the native OS keyrings are already supported whereas for Linux only the UI prompt option is available.

@ShadelessFox
Copy link
Member

This makes sense. Thanks for the information.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants