Pass: Unix Password Manager
Pass vs deterministic password generators
- Debate over deriving passwords from a master secret + domain vs storing per-site passwords.
- Objections to derivation: weird site rules, per-site rotation after breaches, domain changes, and catastrophic failure if the master secret leaks (past and future passwords exposed).
- Deterministic schemes praised for elegance and low “vault anxiety”, but considered impractical for sharing and for sites with password constraints.
Use cases and strengths of pass
- Many users store not just passwords but documents, recovery codes, bank details, and config/API secrets.
- Git backend provides sync, history, and easy backup; passwords are isolated per file, so only the needed secret is decrypted.
- Plays well with scripting: can feed secrets into CLI tools, TUI frontends, or custom scripts (e.g., OTP generation, disaster-recovery bundles).
GPG, age, and cryptographic concerns
- GPG is seen as powerful but complex and finicky (agents, defaults, Yubikey quirks, packaging).
- Some argue GPG is outdated and hard to reason about; others defend it as well-audited and flexible, especially with signatures and hardware-backed keys.
- age-based replacements (e.g., passage, other pass-like tools) are promoted as simpler, but they lose some hardware-token workflows.
Mobile and cross-platform integration
- Major pain point: lack of polished, “just download and go” official mobile clients.
- Android: termux + pass, older/archived apps, community forks on F-Droid; GPG dependencies and Yubikey support can be rough.
- iOS: third-party app integrates with system autofill and pass-otp, but no good Yubikey story on iPad/iPhone.
- Some users SSH into a Unix box instead of native apps.
Hardware keys and threat model
- Strong enthusiasm for Yubikey + OpenPGP: key never leaves hardware, each decryption can require a touch, and adding passwords needs only the public key.
- Compared to GUI managers, pass + hardware token is seen as harder to “mass-exfiltrate” if the machine is compromised, though others note any unlocked manager is vulnerable.
Team and corporate usage
- Mixed experience using pass for organizations: fine-grained access via per-directory keys is possible, but no audit trail of who actually opened which secret and no clean way to erase pushed data.
- Dedicated team tools (1Password, Bitwarden/Vaultwarden, Passbolt, KeePassXC-based setups) are often preferred for sharing, audit, and CI/automation use cases.
Critiques and limitations
- Unstructured data format complicates generic tooling and scripting; conventions (first line password, “user:” lines, per-field files) partially mitigate this.
- Reviewing history via git is nontrivial; metadata (file names/tree) leaks even when contents are encrypted.
- Browser integration can be clunky or brittle, especially with sandboxed/Flatpak browsers.
- Several long-time users have migrated to KeePassXC or Bitwarden for better mobile UX, sharing, and fewer GPG headaches, while others remain very satisfied with pass’s simplicity and Unix philosophy.