- Jul 18, 2003
- 12,463
- 1,179
- 126
Does it do any good to use KeePass to store the encryption keys for a TrueCrypt encrypted drive? Or am I wasting my time and I should just give the drives less complex passwords that I'll need to remember?
My logic is this, each TrueCrypt drive I'm encrypting can have it's own unique 16+ character random key in the format of Aa1$, which is much more complex of a password than I'm capable of remembering. The KeePass password is 8+ characters with upper, lower, numbers, and special characters, but part of it could be subject to a dictionary attack, as it is a word + numbers + special characters. I also used the keyfile feature of KeePass for extra security.
Also, any reason to pick one encryption algorithm over another? I'm currently using SHA512.
Finally, is there any issue with putting an encrypted file container on an encrypted drive?
Edit: A little more info. I keep a copy of the KeePass database on the encrypted partition, which is shared out over the network from my home server for ease of use at home. To unlock the partition originally, I use a copy of the database that's stored on on a USB key and the keyfile is kept in a spot that's not obvious on each local machine. I keep a password protected copy of the KeePass database on my Cloud drive, as it's kinda important, but I don't store the keyfile there. The only flaws I have that are know to me are that I do keep a paper copy of all the KeePass passwords in our safety deposit box, for the scenario that I would die unexpectedly, and while the partition is unencrypted, the data could be grabbed over the network from one of my local machines if they were compromised. I think those two are reasonable risks that balance security and the ability for my family to get the data if I'm not around to help retrieve it. Just trying to secure stuff from the "bad guys", but I want my family to be able to access stuff in the event of my untimely demise.
My logic is this, each TrueCrypt drive I'm encrypting can have it's own unique 16+ character random key in the format of Aa1$, which is much more complex of a password than I'm capable of remembering. The KeePass password is 8+ characters with upper, lower, numbers, and special characters, but part of it could be subject to a dictionary attack, as it is a word + numbers + special characters. I also used the keyfile feature of KeePass for extra security.
Also, any reason to pick one encryption algorithm over another? I'm currently using SHA512.
Finally, is there any issue with putting an encrypted file container on an encrypted drive?
Edit: A little more info. I keep a copy of the KeePass database on the encrypted partition, which is shared out over the network from my home server for ease of use at home. To unlock the partition originally, I use a copy of the database that's stored on on a USB key and the keyfile is kept in a spot that's not obvious on each local machine. I keep a password protected copy of the KeePass database on my Cloud drive, as it's kinda important, but I don't store the keyfile there. The only flaws I have that are know to me are that I do keep a paper copy of all the KeePass passwords in our safety deposit box, for the scenario that I would die unexpectedly, and while the partition is unencrypted, the data could be grabbed over the network from one of my local machines if they were compromised. I think those two are reasonable risks that balance security and the ability for my family to get the data if I'm not around to help retrieve it. Just trying to secure stuff from the "bad guys", but I want my family to be able to access stuff in the event of my untimely demise.
Last edited:
