Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-18 Thread Matthias Schmidt
Hi Burak, and thanks pointing to you work. The memory-pinning was rather easy to integrate, have a look: https://github.com/ms140569/loki/commit/ad02ac092e56d4ac96ffaf8b737dac515516abfe Timing-out the key-agent is something which came to my mind as well - i guess i'll do it optionally. cheers

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-18 Thread Burak Serdar
On Tue, Oct 16, 2018 at 1:55 PM Matthias Schmidt wrote: > > And here it is: > > https://github.com/ms140569/loki/releases/tag/1.2.0 Thanks for sharing this. I find this interesting because I've been working on a very similar idea for an OIDC token manager CLI, and came up with almost the same sc

[go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-16 Thread Matthias Schmidt
Thanks for giving it a go! cheers, Matthias Am Dienstag, 16. Oktober 2018 13:32:20 UTC+2 schrieb Thorsten Sommer: > > Thank you Matthias, for sharing your work. I find your password manager > useful. Keep the good work. > > Am Sonntag, 14. Oktober 2018 17:49:04 UTC+2 schrieb Matthias Schmidt: >

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-16 Thread Matthias Schmidt
And here it is: https://github.com/ms140569/loki/releases/tag/1.2.0 Thanks to your guy's input the key-agent should be now way more secure. cheers, Matthias Am Dienstag, 16. Oktober 2018 20:31:42 UTC+2 schrieb Matthias Schmidt: > > Hi Christopher + Eric, > > thanks for your feedback. You are r

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-16 Thread Christopher Nielsen
Maybe we're talking about different things. Are you thinking of TOTP 2FA tokens? Your arguments do apply to those. I'm not talking about those. I'm talking about devices like a yubikey, which is essentially a a poor person's HSM. On Mon, Oct 15, 2018 at 7:21 PM robert engels wrote: > > That is n

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-16 Thread Matthias Schmidt
Hi Christopher + Eric, thanks for your feedback. You are right, i really underestimated the risk of such attacks. I will lock the key-holding memory in the next release. cheers, Matthias Am Montag, 15. Oktober 2018 23:13:32 UTC+2 schrieb Christopher Nielsen: > > On Mon, Oct 15, 2018 at 1:28

[go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-16 Thread Thorsten Sommer
Thank you Matthias, for sharing your work. I find your password manager useful. Keep the good work. Am Sonntag, 14. Oktober 2018 17:49:04 UTC+2 schrieb Matthias Schmidt: > > Hi Gophers, > > I’ve created a command line password manager in the style of the “pass” > utility by Jason A. Donenfeld (h

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-16 Thread EricR
The attack does not require the attacker to have root on the compromised machine. It does, however, require the page file not to be encrypted, as is common on Linux and Unix systems. The attack I've described requires physical access, e.g. by quickly copying the hard disk. There are special too

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread robert engels
Also, what maybe I wasn’t clear here - that is the ‘verification is local - say a local app’, if the machine has been compromised - the binary can be edited to remove the security check - no need to even have the dongle - thus the requirement for an external resource being protected. > On Oct 1

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread robert engels
That is not true. If you lose the key, anyone else can use the device - which is why there is usually an additional requirement beyond the hardware key - I am referring to hardware dongles given to users. By LOSE I meant unknowingly lost - not that once I lose it and KNOW I’ve lost it I deactiv

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread Christopher Nielsen
On Mon, Oct 15, 2018 at 4:33 PM robert engels wrote: > > To clarify, this is for a hardware device that protects a local resource - a > network based protocol that challenges the device for access is a different > story, and yes, when properly implemented is secure (unless someone steals > your

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread Christopher Nielsen
On Mon, Oct 15, 2018 at 4:25 PM robert engels wrote: > > Maybe, but still, if they have root access to your machine, they can just as > easily alter the accessing binary to send the decoded password elsewhere > after it has decoded it… Which is why you disable remote root access on hosts that r

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread robert engels
To clarify, this is for a hardware device that protects a local resource - a network based protocol that challenges the device for access is a different story, and yes, when properly implemented is secure (unless someone steals your device! - which is why it is usually password + device, and the

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread robert engels
Maybe, but still, if they have root access to your machine, they can just as easily alter the accessing binary to send the decoded password elsewhere after it has decoded it… Which is why applications on osx are “signed” (to prohibit tampering) (although if you have root access - you could prob

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread Christopher Nielsen
On Mon, Oct 15, 2018 at 3:10 PM robert engels wrote: > > Exactly - and systems do not typically have this - yet are considered secure. > If the plain text is ever available - and it almost always is (in the > original input component, etc.) it is always subject to attack/hack - and as > far as

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread robert engels
Exactly - and systems do not typically have this - yet are considered secure. If the plain text is ever available - and it almost always is (in the original input component, etc.) it is always subject to attack/hack - and as far as I am aware without hardware support (dongle, etc.) this is a lim

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread robert engels
If the user has the ability to read the page file - i.e. root - then he also has the ability to use the debugger to inspect the live memory as well - so as the OP pointed out - if root is compromised - nothing is secure. > On Oct 15, 2018, at 4:36 PM, EricR wrote: > > If the memory in which th

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread Christopher Nielsen
On Mon, Oct 15, 2018 at 2:17 PM robert engels wrote: > > As long as the passwords are not stored in plain text in memory - meaning > they are only temporarily decoded in order to be provided (and then the > memory wiped) - there is no difference than the underlying security of the > file encryp

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread EricR
If the memory in which the master key resides is not locked, then it may be written to the page file. An attacker may thus boot the machine from an external disk, mount the disk, read the page file, obtain the master key from the page file, and then decrypt the password database. The attack req

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread robert engels
As long as the passwords are not stored in plain text in memory - meaning they are only temporarily decoded in order to be provided (and then the memory wiped) - there is no difference than the underlying security of the file encryption on disk, no ? > On Oct 15, 2018, at 4:13 PM, Christopher N

Re: [go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread Christopher Nielsen
On Mon, Oct 15, 2018 at 1:28 PM Matthias Schmidt wrote: > > Hi Eric, > > thanks *a lot* for your valuable feedback! I really appreciate it. See > comments inline: > > Am Montag, 15. Oktober 2018 12:09:32 UTC+2 schrieb EricR: >> >> Since you're looking for opinions on the security concept, two que

[go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread Matthias Schmidt
Hi Eric, thanks *a lot* for your valuable feedback! I really appreciate it. See comments inline: Am Montag, 15. Oktober 2018 12:09:32 UTC+2 schrieb EricR: > > Since you're looking for opinions on the security concept, two questions > spring immediately to my mind: > > 1. Does the daemon keep th

[go-nuts] Re: Command line password manager using AES symmetric key encryption, Argon2 KDF, Key-Agent and Keepass importer

2018-10-15 Thread EricR
Since you're looking for opinions on the security concept, two questions spring immediately to my mind: 1. Does the daemon keep the sensitive data in locked memory that cannot be paged out? If so, how cross-platform is this? 2. How does the client communicate securely with the daemon? Which en