Pull request #10974 introduces the @bitwarden/sdk-internal dependency which is needed to build the desktop client. The dependency contains a licence statement which contains the following clause:

You may not use this SDK to develop applications for use with software other than Bitwarden (including non-compatible implementations of Bitwarden) or to develop another SDK.

This violates freedom 0.

It is not possible to build desktop-v2024.10.0 (or, likely, current master) without removing this dependency.

  • twirl7303@lemmy.world
    link
    fedilink
    arrow-up
    25
    ·
    16 days ago

    If this is not resolved I will likely switch to another service. Free software compatibility was the main reason I paid for bitwarden over its competitors.

    • AustralianSimon@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      7
      ·
      15 days ago

      What does this change for you?

      Seems to change nothing for all my devices which is a cheap offering at $10/year.

      • youmaynotknow@lemmy.ml
        link
        fedilink
        arrow-up
        7
        arrow-down
        2
        ·
        15 days ago

        How will anyone know what they add to the code now? That’s the problem, and with our fucking passwords no less. They can fuck right off. In my environment alone they will be loosing upwards of 3,500 dollars yearly, 700,000 if I can convince my boss to dump them for the company as well.

  • fl42v@lemmy.ml
    link
    fedilink
    arrow-up
    35
    arrow-down
    11
    ·
    16 days ago

    Thanks for sharing your concerns here. We have been progressing use of our SDK in more use cases for our clients. However, our goal is to make sure that the SDK is used in a way that maintains GPL compatibility.

    • the SDK and the client are two separate programs
    • code for each program is in separate repositories
    • the fact that the two programs communicate using standard protocols does not mean they are one program for purposes of GPLv3

    Being able to build the app as you are trying to do here is an issue we plan to resolve and is merely a bug.

    I.e. “fuck you and your foss”

  • wuphysics87@lemmy.ml
    link
    fedilink
    arrow-up
    9
    ·
    15 days ago

    A few questions out of ignorance. How different is this to gitlab’s open core model? Is this a permanent change? Is the involvement of investors the root of this? Are we overreacting as it doesn’t meet our strict definition of foss?

    • Atemu@lemmy.ml
      link
      fedilink
      arrow-up
      7
      ·
      15 days ago

      How different is this to gitlab’s open core model?

      That’s a really good question that I don’t immediately have a satisfying answer to.

      There are some differences I can point out though:

      • Gitlab has demonstrated its commitment to keep the core of their product, though limited in features, free and open source. As of now, BW’s clients cannot even be compiled without the proprietary SDK anymore.
      • Gitlab was always a permissive license (MIT) and never attempted to subvert its original license terms
      • Gitlab-EE’s “closed” core is actually quite open (go read the source code) but still squarely in the proprietary camp because it requires you to have a valid subscription to exercise your freedoms.

      Is this a permanent change?

      It’d be quite trivial for them to do in technical terms: Either license the SDK as GPL or stop using it in the clients.

      I don’t see a reason for them to roll it back though. This was decided long ago and they explicitly decided to stray away from the status quo and make it closed source.

      The only thing I could see making them revert this would be public pressure. If they lose a sufficient amount of subscribers over this, that might make them reconsider. Honestly though by that time, the cat’s out of the bag and all the public goodwill and trust is gone.
      It’s honestly a bafflingly bad decision from even just a business perspective. I predict they’ll lose at least 20% but likely 30-50% of their subscribers to this.

      Is the involvement of investors the root of this?

      I find that likely. If it stinks, it’s usually something stinky’s fault.

      Are we overreacting as it doesn’t meet our strict definition of foss?

      They are attempting to subvert one of the FOSS licenses held in the highest regard. You cannot really be much more anti than this.

      An “honest” switch to completely proprietary licenses with a public announcement months prior would have been easier to accept.

      • asap@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        15 days ago

        Gitlab has demonstrated its commitment to keep the core of their product, though limited in features, free and open source. As of now, BW’s clients cannot even be compiled without the proprietary SDK anymore.

        None of that makes Bitwarden not open source. Not only that, they specifically state this is a bug which will be addressed.

        I would go as far as to say that Bitwarden’s main competitive advantage and differentiation is that it’s open source. They would be insane to stop that.

        • cmhe@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          15 days ago

          None of that makes Bitwarden not open source.

          Yes, it does, because it violates its own license GPLv3 by having proprietary build-/runtime dependencies.

          If it was under a different, maybe more permissive, open source license, then maybe it would still be open source, but as of right now i likely breaks its own license terms.

          Not only that, they specifically state this is a bug which will be addressed.

          From what they state, they think that because executables that share internal information via standard protocols does somehow not break GPL3 terms compared to two libraries that share internal state via the standardized C ABI which does. And they seem to not consider that a bug, just the build-time dependency.

          • asap@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            edit-2
            15 days ago

            Sorry that’s my mistake - I should have said “source available”, rather than “open source”. IMO, being source available is the critical component of a password manager like Bitwarden, and is what I meant when I referred to their main competitive advantage.

            They might also choose to be open source and fix this specific issue and return to GPL-compatibility, but remaining source available would seem to be the more critical factor.

            • cmhe@lemmy.world
              link
              fedilink
              arrow-up
              2
              ·
              15 days ago

              So you meant to say:

              I would go as far as to say that Bitwarden’s main competitive advantage and differentiation is that it’s source is available.

              That is not true, there are a lot of other password management software out there where the client source code is either open source or source available. For instance keyguard: https://github.com/AChep/keyguard-app?tab=License-1-ov-file#readme which is an alternative proprietary bitwarden client, where the source is also available. Also the Proton Pass client is under GPLv3.

              I would argue that the main advantage of bitwarden compared to others is that it is open source and has an open source server for self-hosting (vaultwarden). Which of course makes it difficult in terms of business strategy with their VC funding. But maybe becoming a non-profit org and getting money from donors, the strategic funds of EU and other governments, etc. might be an alternative way.

              • asap@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                edit-2
                15 days ago

                I’m not aware of any other enterprise password management where the server source is available and auditable. Proton certainly is not.

    • NostraDavid@programming.dev
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      15 days ago

      Bitwarden has an export functionality. Export to JSON, import in Keepass, done.

      There’s KeePassXC if you want Linux support (keepass2 file is compat with XC variant).

      • daggermoon@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        14 days ago

        Thank you! It seems this whole thing was a misunderstanding however. It was an error on Bitwarden’s part that they intend to correct. I may still switch to kepassxc later on, mostly to save the money.

  • wuphysics87@lemmy.ml
    link
    fedilink
    arrow-up
    7
    ·
    15 days ago

    How would the community’s reaction be if Bitwarden goes, “Look, we are moving more into the enterprise space, which means using proprietary software to service their needs. Our intention is to keep the enterprise and public versions sandboxed, but there is crossover, and we made a mistake.”? I really don’t care what they do in the enterprise space. Perhaps I’m an apologist, but seemingly more torn than most other posters.

  • umbrella@lemmy.ml
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    edit-2
    15 days ago

    i was about to replace my glorified encrypted text file for a password manager. guess relying on 3rd parties in a late-stage capitalist world is not a viable alternative.

    ill stay with my encrypted text file until they privatize encryption. by then ill probably be carving my passwords out on stone. or burning down the servers of these fucking pigs trying to make us identify ourselves for everything on the internet now.

  • ᗪᗩᗰᑎ@lemmy.ml
    link
    fedilink
    arrow-up
    5
    ·
    15 days ago

    Looks like I might be moving to Proton Pass after all! I’ll give them some time to see what they do about this, but will happily give my money to someone else and migrate friends/family as well.

  • fireshell@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    11 days ago

    https://github.com/bitwarden/clients/issues/11611#issuecomment-2436287977

    We have made some adjustments to how the SDK code is organized and packaged to allow you to build and run the app with only GPL/OSI licenses included. The sdk-internal package references in the clients now come from a new sdk-internal repository, which follows the licensing model we have historically used for all of our clients (see LICENSE_FAQ.md for more info). The sdk-internal reference only uses GPL licenses at this time. If the reference were to include Bitwarden License code in the future, we will provide a way to produce multiple build variants of the client, similar to what we do with web vault client builds.

    https://github.com/bitwarden/sdk-internal/commit/db648d7ea85878e9cce03283694d01d878481f6b

    Thank you to Bitwarden for relicensing a thing to GPLv3 License!

  • nadiaraven@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    15 days ago

    Okay, we’ll I’ve been using vaultwarden. When should I switch to something new, and what’s a good alternative?

  • fireshell@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    1
    ·
    edit-2
    15 days ago

    pass is enough (+ xdotool + rofi + pass-menu). Synchronization via git or Syncthing.

      • fireshell@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        ·
        edit-2
        15 days ago

        Integration with Android

        The GnuPG implementation for Android is called OpenKeychain. To configure it, just go to the “key management” menu and import the previously created secret key. The only drawback of OpenKeychain for me personally is that there is no fingerprint unlocking.

        The pass implementation for Android is called android-password-store, or simply APS.

        Install and launch APS. Before synchronizing the password store, go to the “Settings” menu. There we will need the following items:

        1. Git server settings. The resulting URL should be the same as that specified on the repository page on github. Authorization type - OpenKeychain.

        2. Git utils. In this section, specify the username and email from the gpg key.

        3. OpenPGP provider. Select OpenKeychain.

        4. Autofill.

        Now you can clone. Select “clone from server” on the main screen, specify the desired location of the repository, check the git settings.

        Of course, pass is not that easy to set up. However, this price buys confidence that the tools we use will not one day be declared obsolete, will not change their data format, and will not be left without support.