1
1
# [ ![ CircleCI] ( https://circleci.com/gh/malnick/cryptorious.svg?style=svg )] ( https://circleci.com/gh/malnick/cryptorious )
2
2
3
- Like 1Password but for the CLI. Stores your encrypted data in eyaml using generic SSH keys as the basis for encryption/decryption so you never have to type a password to get your passwords ever again.
4
-
5
- ## Download
6
- ### Linux
7
- - AMD64 | [ v1.2.1] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.2.1 )
8
- - AMD64 | [ v1.2.0] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.2.0 )
9
- - AMD64 | [ v1.1.0] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.1.0 )
10
- - AMD64 | [ v1.0.0] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious )
11
-
12
- ### Darwin (OSx)
13
- - AMD64 | [ v1.2.1] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.2.1_darwin )
3
+ Like 1Password but for the CLI.
14
4
15
5
## Manpage
16
6
### Main Menu
17
7
```
18
- NAME:
19
-
20
- _________ __ .__
8
+ _________ __ .__
21
9
\_ ___ \ _______ ___.__.______ _/ |_ ____ _______ |__| ____ __ __ ______
22
10
/ \ \/ \_ __ \< | |\____ \ \ __\ / _ \ \_ __ \| | / _ \ | | \ / ___/
23
- \ \____ | | \/ \___ || |_> > | | ( <_> ) | | \/| |( <_> )| | / \___ \
11
+ \ \____ | | \/ \___ || |_> > | | ( <_> ) | | \/| |( <_> )| | / \___ \
24
12
\______ / |__| / ____|| __/ |__| \____/ |__| |__| \____/ |____/ /____ >
25
- \/ \/ |__| \/
13
+ \/ \/ |__| \/
26
14
- CLI-based encryption for passwords and random data
27
15
28
16
USAGE:
29
17
cryptorious [global options] command [command options] [arguments...]
30
-
31
- VERSION:
32
- 1.2.1
33
-
18
+
34
19
AUTHOR(S):
35
- Jeff Malnick <malnick@gmail.com>
36
-
20
+ Jeff Malnick <malnick@gmail.com>
21
+
37
22
COMMANDS:
38
- rename Rename an entry in the vault
39
- rotate Rotate your cryptorious SSH keys and vault automatically
40
- delete Remove an entry from the cryptorious vault
41
- decrypt Decrypt a value in the vault `VALUE`
42
- encrypt Encrypt a value for the vault `VALUE`
43
- generate Generate a RSA keys or a secure password.
23
+ rename Rename an entry in the vault
24
+ delete Remove an entry from the cryptorious vault
25
+ decrypt Decrypt a value in the vault `VALUE`
26
+ encrypt Encrypt a value for the vault `VALUE`
27
+ generate Generate a RSA keys or a secure password.
44
28
45
29
GLOBAL OPTIONS:
46
- --vault-path, --vp "/home/malnick/.cryptorious/vault.yaml" Path to vault.yaml
47
- --private-key, --priv "/home/malnick/.ssh/cryptorious_privatekey" Path to private key
48
- --public-key, --pub "/home/malnick/.ssh/cryptorious_publickey" Path to public key
49
- --debug Debug/Verbose log output
50
- --help, -h Show help
51
- --version, -v Print the version
30
+ --vault-path, --vp "/Users/malnick/.cryptorious/vault.yaml" Path to vault.yaml.
31
+ --debug Debug/Verbose log output.
32
+ --help, -h show help
33
+ --version, -v print the version
34
+ ```
52
35
36
+ ### Encrypt Sub Menu
53
37
```
38
+ NAME:
39
+ encrypt - Encrypt a value for the vault `VALUE`
40
+
41
+ USAGE:
42
+ encrypt [command options] [arguments...]
43
+
44
+ OPTIONS:
45
+ --key-arn KMS key ARN
46
+ ```
47
+
54
48
### Decrypt Sub Menu
55
49
```
56
50
NAME:
@@ -64,6 +58,7 @@ OPTIONS:
64
58
--goto, -g Open your default browser to https://<key_name> and login automatically
65
59
--timeout, -t "10" Timeout in seconds for the decrypt session window to expire
66
60
```
61
+
67
62
### Rename Sub Menu
68
63
```
69
64
NAME:
@@ -76,6 +71,7 @@ OPTIONS:
76
71
--old, -o Name of old entry name [key] in vault
77
72
--new, -n Name of new entry name [key] in vault
78
73
```
74
+
79
75
### Generate Sub Menu
80
76
```
81
77
NAME:
85
81
generate command [command options] [arguments...]
86
82
87
83
COMMANDS:
88
- keys Generate SSH key pair for cryptorious
89
- password [--[l]ength] Generate a random password
84
+ password [--[l]ength] Generate a random password
90
85
91
86
OPTIONS:
92
87
--help, -h show help
@@ -99,36 +94,25 @@ Build it and install: `make install`
99
94
100
95
Add to your ` .[bash | zsh | whatever]rc ` : ` alias cpt=cryptorious `
101
96
102
- ## Step 1: Generate keys
97
+ ## Step 1: Add KMS keys to AWS
98
+ NOTE: will add cmd for this soon
103
99
104
- ```
105
- cryptorious generate keys
106
- ```
107
-
108
- Defaults to placing keys in ``` $HOME/.ssh/cryptorious_privatekey ``` and ``` $HOME/.ssh/cryptorious_publickey ``` .
109
-
110
- You can override this with ``` --private-key ``` and ``` --public-key ``` :
111
-
112
- ```
113
- cryptorious generate keys --private-key foo_priv --public-key foo_pub
114
- ```
115
-
116
- ### Lock It Down
117
- If you want to win extra security stars, lock down your keys with root ownership. By default they're already read/write by the user who ran the ` cryptorious ` command (0600), but you can increase this security more with ` chmod root:root ~/.ssh/cryptorious_privatekey ` . Now you'll have to run ` cryptorious ` with ` sudo ` and enter in your root password (ugh, passwords..) every time.
100
+ In your own AWS account, add a KMS key and grant your IAM user access.
118
101
119
102
## Step 2: Encrypt
103
+ NOTE: will add flag for AWS profile soon
120
104
105
+ Use your AWS profile and encrypt some data:
121
106
```
122
- cryptorious encrypt github
107
+ AWS_PROFILE=personal cryptorious encrypt --key-arn=<my_kms_key_arn> github.com
123
108
```
124
109
125
110
Will open a ncurses window and prompt you for username, password and a secure note. All input is optional.
126
111
127
-
128
112
## Step 3: Decrypt
129
113
130
114
```
131
- cryptorious decrypt thing
115
+ AWS_PROFILE=personal cryptorious decrypt thing
132
116
```
133
117
134
118
Will open a ncurses window with the decrypted vault entry.
@@ -144,19 +128,6 @@ If you've saved your vault entries with the URI of the site they belong to (i.e.
144
128
cpt d -g -c github.com
145
129
```
146
130
147
- ## Step 4: Rotate Keys & Vault
148
- Compromised your keys? Not a problem.
149
-
150
- ```
151
- cryptorious rotate
152
- ```
153
-
154
- 1 . Backs up your old keys to ` keyPath.bak `
155
- 1 . Backs up your old vault to ` vaultPath.bak `
156
- 1 . Generates new keys to ` keyPath `
157
- 1 . Decrypts vault using ` cryptorious_privatekey.bak ` and encrypts vault in place with new ` cryptorious_publickey `
158
- 1 . Writes the vault back to disk at ` vaultPath `
159
-
160
131
## Step 5: Generate Secure Password
161
132
The ` generate ` command also lets you generate random, secure passwords of ` n ` length:
162
133
```
0 commit comments