cryptutils
is a set of common Go packages for doing encryption using
NaCl and Ed25519 keys. It also includes a set of command line tools:
- secrets: command-line secrets manager
- otpc: command-line two-factor authentication token manager
- journal: password-backed journal
- passcrypt: password-based file encryption
The useful tools are all password-based at this time. secrets
, otpc
,
and journal
are all based on a common secret storage system. The
secrets
program provides a general-purpose secret management system;
journal
and otpc
provide specialised interfaces for specific types
of secrets (notes and TOTP/HOTP keys, respectively).
The programs are in the cmd/
subdirectory; each project has its own
README.
cryptutils
uses NaCl's secretbox (Salsa20 and Poly1305) for
secret-key encryption, NaCl's box (Curve25519, Salsa20, and Poly1305)
for public-key encryption, and Ed25519 for digital
signatures. Typically, secret keys are derived in one of ways: via
Scrypt, or via an ECDH exchange. For Scrypt, the parameters N=1048576,
r=8, and p=1 are used. This makes generating keys using this expensive
(typically, around 5 seconds on my 2.6 GHz i5 machine with 6G of
RAM). When encrypting messages using public keys, an ephemeral key is
generated for the encryption and a shared key is derived from
this. The public key is prepended to the message for extraction by the
recipient. When signing and encrypting using public keys, the message
is signed before encrypting. The recipient will decrypt, then validate
the signature.
NOTE: previous versions used N=32768, and will need to use the
migrate-store
utility to migrate the store over (or use the previous
versions).
I hated depending on my phone for managing two-factor authentication
(I prefer to not carry it around), which led to the first iteration of
otpc
. This used Scrypt and NaCl to secure the tokens. Later, I
wanted a password manager that I could use on the command-line and
send passwords to xclip (or pbcopy if I was on a Mac); the first
iteration of password
copied the crypto.go
file from
otpc
. Finally, I wanted to replace sshcrypt
with a
NaCl/Ed25519-based system; at this point, I realised that it would be
easier to refactor the crypto components into a common set of
packages. This included building a generalised keyring for fcrypt
and, realising that the same data structure lent itself well to
password
and otpc
, a common datastore for secrets. Eventually,
passwords
was renamed to secrets
when I began to use it for
manipulating the otpc
store, letting me keep a lot of unnecessary
functionality out of otpc
. At some point, I realised the datastore
could also be used for storing journal entries, and added a journaling
front end.
- golang.org/x/crypto
- github.com/agl/ed25519
- github.com/conformal/yubikey
- github.com/gokyle/readpass
cryptutils
is licensed under the ISC license.