Skip to content

c2FmZQ/c2FmZQ

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

echo -n safe | base64

c2FmZQ

Overview

c2FmZQ is an application that can securely encrypt, store, and share files, including but not limited to pictures and videos.

There is a command-line client application, a server application, and an experimental Progressive Web App that can run in most modern browsers.

The server is the central repository where all the encrypted data can be stored. It has no way to access the client's plaintext data.

The PWA and the command-line clients are used to import, export, organize, and share files.

They use an API that's compatible with the Stingle Photos app (https://github.com/stingle/stingle-photos-android) published by stingle.org, which can also be used with c2FmZQ.

This project is NOT associated with stingle.org. This is not the code used by stingle.org. The code in this repo was developed by studying the client app's code and reverse engineering the API. Stingle eventually released their server code in April 2023.


Notes about security and privacy

This software has not been reviewed for security. Review, comments, and contributions are welcome.

The server has no way to decrypt the files that are uploaded by the clients. It only knows how many files you have, how big they are, and who they're shared with.

The clients have to trust the server when sharing albums. The server provides the contact search feature (/v2/sync/getContact), which returns a User ID and a public key for the contact. Then, the album is shared with that User ID and public key (via /v2/sync/share).

A malicious server could replace the contact's User ID and public key with someone else's, and make the user think they're sharing with their friend while actually sharing with an attacker. The command-line client application lets the user verify the contact's public key before sharing.

When viewing a shared album, the clients have to trust that the shared content is "safe". Since the server can't decrypt the content, it has no way to sanitize it either. A malicious user could share content that aims to exploit some unpatched vulnerability in the client code.

Once an album is shared, there is really no way to completely unshare it. The permissions on the album can be changed, but it is impossible to control what happens to the files that were previously shared. They could have been downloaded, exported, published to the New York Times, etc.

Since c2FmZQ is compatible with the Stingle Photos API, it uses the same cryptographic algorithms for authentication, client-server communication, and file encryption, namely:

  • Argon2 for password key derivation on the client side; bcrypt on the server side,
  • NaCl (Curve25519/XSalsa20/Poly1305) for client-server authentication and encryption,
  • Chacha20+Poly1305 and Blake2b for file encryption and key derivation.

Additionally, it uses AES256-GCM and AES256-CBC with HMAC-SHA256 to encrypt its own metadata, and PBKDF2 for the passphrase key derivation.


c2FmZQ Server

c2FmZQ-server is an API server with a relatively small footprint. It can run just about anywhere, as long as it has access to a lot of storage space, and a modern CPU. It must be reachable by the clients via HTTPS.

The server needs at least two pieces of information: the name of the directory where its data will be stored, and a passphrase to protect the data. The passphrase can be read from a file or retrieved with an external command, otherwise the server will prompt for it when it starts.

For TLS, the server also needs the TLS key, and certificates. They can be read from files, or directly from letsencrypt.org.


Connecting the Stingle Photos app to this server

Starting with v2.10.2, the Stingle Photos app can connect to this server without any code changes.

On the Welcome Screen, click the setting button at the top right corner and then enter the URL of your server.


Scale and performance

The server was designed for personal use, not for large scale deployment or speed. On a modern CPU and SSD, it scales to 10+ concurrent users with tens of thousands of files per album, while maintaining a response time well under a second (excluding network I/O).

On a small device, e.g. a raspberry pi, it scales to a handful of concurrent users with a few thousand files per album, and still maintain an acceptable response time.


How to run the server

The server is self-contained. It doesn't depend on any external resources. It stores all its data on a local filesystem.

It can run on AWS (Howto) or any other cloud providers. It can run in a docker container. It can run on Linux, MacOS, Windows. It can run on a raspberry pi, or on a NAS. It can run pretty much on anything that has at least 1 GB of RAM.


Pull the docker image

You can find the c2fmzq-server image on hub.docker.com.

docker pull c2fmzq/c2fmzq-server:latest

Then run the server with something like:

docker run \
    --name=c2fmzq-server \
    -d \
    -u 1000:1000 \
    -p 8080:80 \
    -p 8443:443 \
    -e C2FMZQ_DOMAIN="${DOMAIN}" \
    -e C2FMZQ_PASSPHRASE_FILE="" \
    -e C2FMZQ_PASSPHRASE="<passphrase>" \
    -v ${DATABASEDIR}:/data \
    c2fmzq/c2fmzq-server:latest

The TLS credentials are fetched from letsencrypt.org automatically.

${DATABASEDIR} is where all the encrypted data will be stored. The database passphrase can stored in a file, or passed in an environment variable. ${DOMAIN} is the domain or hostname to use.

The domain or hostname must resolve to the IP address where the server will be running, and firewall and/or port forwarding rules must be in place to allow TCP connections to ports 80 and 443 inside the container. The clients will connect to https://${DOMAIN}/.


Or, build your own docker image

docker build -t c2fmzq/c2fmzq-server .

Or, build it, and run it locally

cd c2FmZQ/c2FmZQ-server
go build
./c2FmZQ-server help
NAME:
   c2FmZQ-server - Run the c2FmZQ server

USAGE:
   c2FmZQ-server [global options]  

GLOBAL OPTIONS:
   --database DIR, --db DIR         Use the database in DIR (default: "$HOME/c2FmZQ-server/data") [$C2FMZQ_DATABASE]
   --address value, --addr value    The local address to use. (default: "127.0.0.1:8080") [$C2FMZQ_ADDRESS]
   --path-prefix value              The API endpoints are <path-prefix>/v2/... [$C2FMZQ_PATH_PREFIX]
   --base-url value                 The base URL of the generated download links. If empty, the links will generated using the Host headers of the incoming requests, i.e. https://HOST/. [$C2FMZQ_BASE_URL]
   --redirect-404 value             Requests to unknown endpoints are redirected to this URL. [$C2FMZQ_REDIRECT_404]
   --tlscert FILE                   The name of the FILE containing the TLS cert to use. [$C2FMZQ_TLSCERT]
   --tlskey FILE                    The name of the FILE containing the TLS private key to use. [$C2FMZQ_TLSKEY]
   --autocert-domain domain         Use autocert (letsencrypt.org) to get TLS credentials for this domain. The special value 'any' means accept any domain. The credentials are saved in the database. [$C2FMZQ_DOMAIN]
   --autocert-address value         The autocert http server will listen on this address. It must be reachable externally on port 80. (default: ":http") [$C2FMZQ_AUTOCERT_ADDRESS]
   --allow-new-accounts             Allow new account registrations. (default: true) [$C2FMZQ_ALLOW_NEW_ACCOUNTS]
   --auto-approve-new-accounts      Newly created accounts are auto-approved. (default: true) [$C2FMZQ_AUTO_APPROVE_NEW_ACCOUNTS]
   --verbose value, -v value        The level of logging verbosity: 1:Error 2:Info 3:Debug (default: 2 (info)) [$C2FMZQ_VERBOSE]
   --passphrase-command COMMAND     Read the database passphrase from the standard output of COMMAND. [$C2FMZQ_PASSPHRASE_CMD]
   --passphrase-file FILE           Read the database passphrase from FILE. [$C2FMZQ_PASSPHRASE_FILE]
   --passphrase value               Use value as database passphrase. [$C2FMZQ_PASSPHRASE]
   --htdigest-file FILE             The name of the htdigest FILE to use for basic auth for some endpoints, e.g. /metrics [$C2FMZQ_HTDIGEST_FILE]
   --max-concurrent-requests value  The maximum number of concurrent requests. (default: 10) [$C2FMZQ_MAX_CONCURRENT_REQUESTS]
   --enable-webapp                  Enable Progressive Web App. (default: true) [$C2FMZQ_ENABLE_WEBAPP]
   --licenses                       Show the software licenses. (default: false)

Or, build a binary for another platform, e.g. windows, raspberry pi, or a NAS

cd c2FmZQ/c2FmZQ-server
GOOS=windows GOARCH=amd64 go build -o c2FmZQ-server.exe
GOOS=linux GOARCH=arm go build -o c2FmZQ-server-arm
GOOS=darwin GOARCH=arm64 go build -o c2FmZQ-server-darwin

DEMO / test drive

For DEMO or testing purpose, the server can be launched on a github codespace.

Create a codespace for the c2FmZQ/c2FmZQ repository, open the terminal, and run:

cd c2FmZQ
go run ./c2FmZQ-server --passphrase=test

Select Open in Browser to open the PWA, or connect the android app to the same URL.

Please note that this is NOT a secure configuration. Do not use this to store anything you care about.


Experimental features

The following features are experimental and could change or disappear in the future.

Progressive Web App

The PWA is a full-featured client app for c2FmZQ implemented entirely in HTML and javascript.

All the cryptographic operations are performed in the browser using Sodium-Plus, and the app implements the same protocol as the c2FmZQ client and the Stingle Photos app.

To access the PWA:

  • Open your server URL in a browser: https://${DOMAIN}/${path-prefix}/. This requires --enable-webapp to be set on the server. Or,
  • Open https://c2fmzq.org/pwa/ and enter your server URL in the Server field. This works with or without --enable-webapp, Or,
  • Clone https://github.com/c2FmZQ/c2FmZQ.github.io, and publish it on your own web site.

Currently implemented:

  • All account management features (account creation, recovery, etc).
  • All album management features (creating, sharing, moving files, etc).
  • Browsing albums with photos and videos with local encrypted caching for speed or offline conditions.
  • Uploading files with streaming encryption.
  • Photo editing, using a local Filerobot Image Editor
  • Optional push notification when new content or new members are added to shared albums.

Push notification is disabled by default on the server. To enable it, use the inspect edit ps command, and set the top-level enable option to true and set jwtSubject to a valid mailto: or https:// URL (rfc8292). Some push services require a valid email address or web site address.

Enabling push notification for the Microsoft Edge browser on Windows requires extra effort.

go run ./c2FmZQ-server/inspect edit ps

or,

sudo docker exec -it c2fmzq-server inspect edit ps

Multi-Factor Authentication

WebAuthn and One-time passwords can be used as an extra layer of protection for sensitive operations, e.g. login, password changes, account recovery, etc. A strong password is still required to protect the user's main encryption key.

External security keys (e.g. yubikeys), passkeys, and OTP keys can be added from the Profile window on the progressive web app.

When push notifications are enabled, the progressive web app can also be used to authenticate other clients that don't have native support for MFA, e.g. the android app. In that case, a notification will appear in the progressive web app to ask the user to approve or deny the operation.

To use OTP, the user needs an authenticator app like Google Authenticator or Authy.


Decoy / duress passwords

Decoy passwords can be associated with any normal account. When a decoy password is used to login, the login is successful, but the user is actually logged in with a different account, not their normal account.

Note that logging in with decoy passwords is not as safe as normal accounts because the passwords have to be known by the server. So, someone with access to the server metadata could access the files in any decoy account.

To enable, use the inspect decoy command.

docker exec -it c2fmzq-server inspect decoy

c2FmZQ Client

The c2FmZQ client can be used by itself, or with a remote ("cloud") server very similarly.

Sharing only works when content is synced with a remote server.

To connect to a remote server, the user will need to provide the URL of the server when create-account, login, or recover-account is used.

To run it:

cd c2FmZQ/c2FmZQ-client
go build
./c2FmZQ-client
NAME:
   c2FmZQ - Keep your files away from prying eyes.

USAGE:
   c2FmZQ-client [global options] command [command options] [arguments...]

COMMANDS:
   Account:
     backup-phrase    Show the backup phrase for the current account. The backup phrase must be kept secret.
     change-password  Change the user's password.
     create-account   Create an account.
     delete-account   Delete the account and wipe all data.
     login            Login to an account.
     logout           Logout.
     recover-account  Recover an account with backup phrase.
     set-key-backup   Enable or disable secret key backup.
     status           Show the client's status.
     wipe-account     Wipe all local files associated with the current account.
   Albums:
     create-album, mkdir  Create new directory (album).
     delete-album, rmdir  Remove a directory (album).
     rename               Rename a directory (album).
   Files:
     cat, show           Decrypt files and send their content to standard output.
     copy, cp            Copy files to a different directory.
     delete, rm, remove  Delete files (move them to trash, or delete them from trash).
     list, ls            List files and directories.
     move, mv            Move files to a different directory, or rename a directory.
   Import/Export:
     export  Decrypt and export files.
     import  Encrypt and import files.
   Misc:
     licenses  Show the software licenses.
   Mode:
     mount             Mount as a fuse filesystem.
     shell             Run in shell mode.
     webserver         Run web server to access the files.
     webserver-config  Update the web server configuration.
   Share:
     change-permissions, chmod  Change the permissions on a shared directory (album).
     contacts                   List contacts.
     leave                      Remove a directory (album) that is shared with us.
     remove-member              Remove members from a directory (album).
     share                      Share a directory (album) with other people.
     unshare                    Stop sharing a directory (album).
   Sync:
     download, pull   Download a local copy of encrypted files.
     free             Remove the local copy of encrypted files that are backed up.
     sync             Upload changes to remote server.
     updates, update  Pull metadata updates from remote server.

GLOBAL OPTIONS:
   --data-dir DIR, -d DIR        Save the data in DIR (default: "$HOME/.config/.c2FmZQ") [$C2FMZQ_DATADIR]
   --verbose value, -v value     The level of logging verbosity: 1:Error 2:Info 3:Debug (default: 2 (info))
   --passphrase-command COMMAND  Read the database passphrase from the standard output of COMMAND. [$C2FMZQ_PASSPHRASE_CMD]
   --passphrase-file FILE        Read the database passphrase from FILE. [$C2FMZQ_PASSPHRASE_FILE]
   --passphrase value            Use value as database passphrase. [$C2FMZQ_PASSPHRASE]
   --server value                The API server base URL. [$C2FMZQ_API_SERVER]
   --auto-update                 Automatically fetch metadata updates from the remote server before each command. (default: true)

Mount as fuse filesystem

The c2FmZQ client can mount itself as a fuse filesystem. It supports read and write operations with some caveats.

  • Files can only be opened for writing when they are created, and all writes must append. The file content is encrypted as it is written.
  • Once a new file is closed, it is read-only (regardless of file permissions). The only way to modify a file after that is to delete it or replace it. Renames are OK.
  • While the fuse filesystem is mounted, data is automatically synchronized with the cloud/remote server every minute. Remote content is streamed for reading if a local copy doesn't exist.
mkdir -m 0700 /dev/shm/$USER
# Create a passphrase with with favorite editor.
 echo -n "<INSERT DATABASE PASSPHRASE HERE>" > /dev/shm/$USER/.c2fmzq-passphrase
export C2FMZQ_PASSPHRASE_FILE=/dev/shm/$USER/.c2fmzq-passphrase
mkdir $HOME/mnt
./c2FmZQ-client mount $HOME/mnt
I0604 144921.460 fuse/fuse.go:43] Mounted $HOME/mnt

Open a different terminal. You can now access all your files. They will be decrypted on demand as they are read.

ls -a $HOME/mnt
gallery  .trash

Bulk copy in and out of the fuse filesystem should work as expected with:

  • cp, cp -r, mv
  • tar
  • rsync, with --no-times

When you're done, hit CTRL-C where the mount command is running to close and unmount the fuse filesystem.


View content with a Web Browser

The c2FmZQ client can export your files via HTTP so that they can be accessed with a Web Browser

./c2FmZQ-client webserver

The web server can be configured with webserver-config

./c2FmZQ-client webserver-config -h
NAME:
   c2FmZQ-client webserver-config - Update the web server configuration.

USAGE:
   c2FmZQ-client webserver-config [command options]  

CATEGORY:
   Mode

OPTIONS:
   --address value           The TCP address to bind, e.g. :8080
   --password value          The password to access the files
   --export-path value       The file path to export
   --url-prefix value        The URL prefix to use for each endpoint
   --allow-caching           Allow http caching (default: true)
   --clear                   Reset the web server configuration to default values (default: false)
   --autocert-domain value   Enable autocert with this domain
   --autocert-address value  Use this network address for autocert. It must be externally reachable on port 80
   --help, -h                show help (default: false)

For example, to export album Foo on port 8080 with password foobar, use:

./c2FmZQ-client webserver-config --export-path=Foo --address=:8080 --password=foobar
./c2FmZQ-client webserver

Connecting to stingle.org account

To connect to your stingle.org account, --server=https://api.stingle.org/ with login or recover-account.

mkdir -m 0700 /dev/shm/$USER
# Create a passphrase with with favorite editor.
 echo -n "<INSERT DATABASE PASSPHRASE HERE>" > /dev/shm/$USER/.c2fmzq-passphrase
export C2FMZQ_PASSPHRASE_FILE=/dev/shm/$USER/.c2fmzq-passphrase
./c2FmZQ-client --server=https://api.stingle.org/ login <email>
Enter password: 
Logged in successfully.
./c2FmZQ-client ls -a
.trash/
gallery/