vault

command module
v0.2.3 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Aug 2, 2018 License: BSD-3-Clause Imports: 18 Imported by: 0

README

Vault

Build Status

Personal project of a git-based encrypted password store. Each "password" is actually a JSON-encoded map of strings, encrypted through AES-GCM.

The whole store directory is located under $HOME/.vault (overridable through the VAULT_PATH environment variable) and can be pushed to a remote git repository though the vault command.

This is a draft in progress, I would be very cautious with using it to store your most precious passwords. Plus, the storage format is bound to change until 1.0, data will be unusable when it does.

Summary

Create the vault

The following command creates an empty vault and adds one passphrase to be used in it. Later on, you will be able to add more passphrase that can unlock the vault.

$ vault init
Enter passphrase:
Confirm:
INFO[0000] vault created successfully

Key management

The user passphrase does not directly encrypt the store's secrets. Instead, on vault creation, a master key is randomly generated and encrypted with a key derived from the user password (through PBKDF2). This encrypted master key is stored in a file containing metadata about the store, directly alongside the secrets.

The store's master key can be encrypted with any number of passphrases, so several passphrases (or people) could be used to unlock the store. This also allows for seamlessly changing the passphrase used to unlock the store.

Also, a solution for rotating the store's master key is in the pipes.

The available keys in a store can be listed with the following command:

$ vault key list
 - #0 (Tue, 09 Aug 2017, 16:25) Initial key created on vault creation
       721a9b52bfceacc503c056e3b9b93cfa
 - #1 (Tue, 09 Aug 2017, 21:34) Added key for whatever reason
       5d41402abc4b2a76b9719d911017c592

And deleted through this:

$ vault key delete 1
INFO[0000] key was successfully deleted

For obvious reasons, the last key stored in the store's metadata cannot be deleted. You'll have to create another one beforehand.

A new key can be added to the vault, with a custom comment, with this command:

$ vault key add -c 'New key'
Enter passphrase: 
New passphrase: 
Confirm: 
INFO[0007] key was successfully added

The command will prompt you for one of the existing passphrases, and then to enter and confirm the one you want to add.

Rotate the master key

Note: this is an experimental feature that still needs to be tested properly.

In addition of changing the passphrases used to lock and unlock the vault, you can rotate the master key used to encrypt the data. This will re-encrypt all the data contained in the vault with a new random master key, and delete all keys associated with the vault except for the one used to initiate the rotation.

We do our best to try and rollback the repository in case something goes wrong during the process, but this part still needs testing. If anything goes wrong during the master key rotation, check if the vault repository is clean before interacting with it again (if not, a git reset might help).

$ vault key rotate
WARNING: rotating the vault's master key will invalidate all the user passphrases except the one used here.
If the process fails for any reasons, please check your vault repository is clean before going any further.
Are you sure you want to rotate the vault's master key ? (y/N) y
Enter passphrase: 
INFO[0005] secret '/a/a' edited successfully
INFO[0005] secret '/a/b' edited successfully
INFO[0005] secret '/a/c' edited successfully
INFO[0005] vault master key rotation successful

Add a secret

$ vault add dir/subdir/website.com username=apognu password=Str0ngP@ss
Enter passphrase:
INFO[0010] secret 'dir/subdir/website.com' created successfully

vault is attribute-agnostic, there is no special handling of, for instance, the password attribute. You can add any number of attributes to an entry.

Eyes-only attributes

One special kind of attribute is for eyes-only. They only differ in that they are not printed on the console by default, and they are input interactively. Any attribute set without a value will trigger the prompt and will never be printed without the -p option.

$ vault add website.com username=apognu password=
Value for 'password':
Enter passphrase:
INFO[0010] secret 'website.com' created successfully
Generated passwords

One can generate random alphanumeric passwords with the attribute syntax attr=-. By default, a random 16-character password will be generated for that attribute. Generated attributes will automatically be set as eyes-only.

The --symbols option adds special characters into the mix.

$ vault add websites.com username=apognu password=-

One can generate passwords with a different size with the -l option.

File attributes

An entire file can be embedded into an attribute with the syntax attr=@/path/to/file. File attributes will never be printed on the console, and will require the use of -c or -w to be used.

$ vault add ssh/keys pubkey=@/home/apognu/.ssh/id_rsa.pub privkey=@/home/apognu/.ssh/id_rsa
INFO[0010] secret 'ssh/keys' created successfully
$ vault show ssh/keys
Store » ssh » keys
  privkey = <file content>
   pubkey = <file content>

Print a secret

$ vault show dir/subdir/website.com
Store » dir » subdir » website.com
       url = http://example.com/login
  username = apognu
  password = <redacted>

The -p option can be used to display the redacted attributes.

The -c option can be used to copy one attribute to the clipboard. By default, if the entry contains ony one eyes-only attribute, it will be used. If there are more than one eyes-only attribute, the attribute named password will be copied. If you would like to copy another attribute to your clipboard, use the -a option.

When you use the -w option in combination with showing a secret containing file attributes, all the file attributes of that secret will be written to files in a directory named after the secret path.

$ vault show my/secret/file
Store » my » secret » file
  file = <file content>
$ vault show my/secret/file -w
INFO[0000] attribute written to 'vault-my-secret-file/file'

By default, all file attributes are written to matching files. If you wish to restrict which attribute gets considered for writing, use the -f option:

$ vault show my/secret/files -w -f file1 -f file2

For file attributes, -s (for --stdout) can also be used to print the content of a single attribute to your standard output. If the secret only contains one file attribute, it will be automatically selected, otherwise, use -f. You can use this to pipe your secret to other programs, for instance:

$ vault show sshkeys/corporate -w -s -f privkey | ssh-add -

Edit a secret

The syntax for modifying an existing secret is exactly the same as the one used to create one, with one addition: an optional list of attributes to delete.

$ vault edit website.com -d url username=newlogin password=

This command will delete thre url attribute from the secret, change the username attribute to newlogin and prompt for the value of the eyes-only attribute password

Rename a secret

A secret can be renamed through the rename command:

$ vault rename my/first/secret new/location/secret

Delete a secret

$ vault delete dir/subdir/website.com

Seal and unseal the vault

By default, your passphrase will always be asked interactively whenever you create, edit or delete a secret. This can quickly become cumbersome and prone to error. To mitigate this, a user can unseal his vault.

Unsealing one's vault will remember (see below) your passphrase for as long as the vault is left unsealed (or until next reboot), so that any command requiring a passphrase can use it to encrypt and decrypt data.

This works by storing the user's hashed passphrase in a 0400 file under /run/user/ or /tmp.

To unseal your vault:

$ vault unseal

To seal it again:

$ vault seal

Git integration

On vault create, it is automatically set up in a local git repository. You can link it to a remote repository like so:

$ vault git remote <url>

From now on, every change to your vault will automatically result in a commit, which you then can push with:

$ vault git push

Similarly, if the remote repository was changed for any reason (like you using your vault from another computer), you can fetch the latest and brightest with:

$ vault git pull

Remember, the directory $HOME/.vault is a regular git repository, you can used the git command as you like.

HTTP interface

Vault includes a simple HTTP interface that allows for listing and showing encrypted secrets. The server can be launched through the server subcommand. An API key and listen interface can be given as arguments.

$ vault server -k mysupersecretkey -l 0.0.0.0:8080

The interface exposes three endpoints:

  • / -> list all secrets
  • /path/to/secret -> get encrypted information on a secret
  • /-/masterkeys -> get encrypted informations on the master keys

It is up to the client to set up the cryptographic facilities to decrypt anything provided by this interface.

In order to communicate with the API, the Authorization header has contains a HS256-signed JWT, with an exp claim no later than 30 seconds from the nbf claim. The aud claim must be set to vault:<path> (e.g. vault:/-/masterkeys or vault:/).

The key used to sign the token is the string passed to -k.

Warning: it goes without saying that we urge the user to secure the communication between the client and the API through TLS. Each generated token is stateless and is prone to replay attacks.

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL