Keep access data secure with Cryptonify

Master Key

Article from Issue 181/2015
Author(s):

Keep track of your login information for web services with Cryptonify.

Mail providers, social networks, online retailers, auction sites, banks, forums, cloud services and many other services on the Internet want to make life easier for registered users – and usually require authentication with a username and password. The more of these services you use, however, the greater the danger of forgetting or mixing up usernames and passwords. The worst-case scenario is not being able to access your Inbox or data stored on the cloud; unlocking these services costs time and effort. Here the Cryptonify program [1] steps into the breach to keep your access data secure.

As a Java application, Cryptonify requires a corresponding run-time environment, either the one from the GNU project or the Oracle original. You can check whether one of the two versions is already installed on your system using the java-version command in a terminal. If entering the command does not bring a version number to light, you should install the OpenJDK version from the repository of your distribution: This way updates are done automatically when needed. Alternatively, you can use the current Oracle run-time environment [2]. This is no longer included in the distributions' repositories because of the license. Thus, you will need to take care of the necessary updates yourself later.

Getting Started

Cryptonify is available for download for Linux [3] as a 12MB ZIP file. After extracting it, you will find a small shell script in the newly created subdirectory. You can use this shell script to start the software. Manually create a corresponding entry to enable the program by mouse click from a menu.

After launching Cryptonify for the first time, you need to make a few basic settings. The software guides you through several pages of dialog, starting with a greeting and ending with enabling the plugins (Figure 1). The most important steps are specifying the path to the file containing the passwords and creating a master password, which the software requests every time from now on.

Figure 1: The master password allows you to start Cryptonify and protects the stored data.

The dialog for the master password indicates the strength of the selected password in a color-coded bar. This helps avoid weak character strings. If you want to change the master password later, select the Change master password item from the Settings menu in the program window and then enter the new access data.

After you have defined the basic settings, the software opens the program window, where you can define categories in a separate area on the left; you can enter the websites belonging to the individual categories with the appropriate data in the larger area on the right.

Configuration

Before creating categories and entries, you should first take a look at the extensive configuration menus where you can customize the software to suit your personal needs. You can access these dialogs via Settings | Properties in the main window. Call up the options via seven horizontal tabs in the window that opens (Figure 2). You can set the localization for the interface in the General tab, and you can also modify the path to the file with the passwords. Furthermore, you can activate the portable installation, which allows use of the application on removable disks.

Figure 2: Tailor Cryptonify to your needs before you begin collecting access data.

In the second tab, Security, you can specify the period after which passwords expire and which rules apply for locking the application. Passwords that expire regularly increase security, particularly for online services because, in this way, unauthorized persons cannot permanently acquire data. However, you then also need to change the credentials on the respective websites, which can be rather time-consuming. The mechanism for locking the application makes it possible to lock the interface after a certain period of inactivity and thus deny access to the data by prying eyes. In the Internet tab, you can configure automatic updates and activate the downloading of icons used to identify password data.

In the Plugin-Server tab, you will find entries to various browser plugins; Cryptonify supports Firefox and Chrome in Linux. The software passes on the data for authentication on set websites to Firefox and Chrome – this enables automatic login. You can enable the corresponding extension by clicking the applicable browser icon in this window. The web browser then opens the traditional integration dialog for add-ons and restarts after the Cryptonify plugin has been successfully installed. There should now be a key icon in a green circle in the browser; this interacts with the Cryptonify plugin server.

A few particularly important settings are found under Backup-System (Figure 3): Here you can, for example, define backup intervals for the password file. This file, with the extension .cry, includes all the access data you have defined in encrypted form. The 256-bit strong AES encryption is used here, whereby Cryptonify generates the key using the master password with a PBE algorithm. If the password file is lost and there is no backup, you will have to enter all the authentication data into the program again manually. You should definitely enable the automatic backing up option in the Backup-System settings dialog, where you can select convenient setting options, to avoid this tedious and time-consuming procedure.

Figure 3: You should instruct Cryptonify to back up its password file automatically and regularly.

The program allows settings for automatically creating passwords in the Password generator tab. The last tab, Other, allows you to customize various options for the appearance. This way you can, for example, color the individual lines in the list view separately, which significantly increases clarity, particularly with vast numbers of categories. To this end, click the Colors tab on the left side of the window and select the desired color for the odd or even rows. Finally, click Save to save your modifications.

Styling

In Linux, Java applications do not exactly stand out with an impressive appearance. However, with Cryptonify, you do not need to come to terms with a rustic look: You are allowed to change the program's theme in the Style field in the General tab. A selection window lists four interfaces integrated into the software. Additional themes can be downloaded from the Internet and integrated into Cryptonify. To this end, search for the term "java look and feel" in an Internet search engine.

The Look And Feel term denotes ready-made graphical components that define the appearance of an application. These themes are usually available as a Java archive (JAR file). Download the eligible JAR files into a directory of your choice and then click the green plus icon in the Cryptonify settings window on the right in the selection box for the styles.

Then, navigate to the subdirectory containing the JAR file in the file manager that opens and select the file. The new theme is now integrated in Cryptonify, and you can enable it in the selection box. Next, click Save and restart the software when prompted. Cryptonify now sports the new appearance (Figure 4).

Figure 4: Cryptonify can also change its appearance.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • KeePassX

    KeePassX is an open source personal data management tool that lets you keep your passwords, URLs, attachments, and peace of mind

  • In-Depth Security

    More than just a boot manager, GRUB 2 can help you add another line of protection to your security defenses.

  • Security in Linux

    Linux is a very secure system, but it still pays to be cautious.

  • FileZilla

    High-performance GUI-based ftp clients for Linux are hard to find. The graphical FileZilla ftp client closes the gap.

  • Password Tools

    Create secure passwords with the help of a password generator and check for quality at the same time.

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News