Skip to content
This repository has been archived by the owner on Aug 11, 2023. It is now read-only.
/ TUPWVB Public archive

Safely store credentials in secrets, environment variables and config files

License

Notifications You must be signed in to change notification settings

dbsystel/TUPWVB

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TUPW

💡 This repository is no longer actively maintained by DB Systel GmbH. Its development will continue here: https://github.com/xformerfhs/TUPWVB

Safely store secrets in config files, environment variables, and files

Introduction

In almost every project, secrets need to be stored: passwords, tokens, user names, you name it. Developers are faced with the question of how to store these secrets securely? Too often they are simply stored in plain text in configuration files where an attacker can easily find them. If not, often some kind of home-brewn obfuscation is used. This is a very bad idea as it can easily be broken. Sometimes these secrets are encrypted. Most of the time this encryption is done wrong, so that it is not secure. Encryption is hard to do correctly. Even if it is done correctly, the question arises how to store the key for the encrypted secret and once again one is faced with the problem of how to securely store this key?

This project helps to solve the above problem in two ways:

  1. It uses a secure encryption
  2. It divides the key in different parts, so there is not one single place where it is stored

This alleviates the usability problem described above.

Of course, if one can use key management systems like Azure Key Vault, AWS KMS, AWS Secrets Manager, Google Cloud KMS, or Hashicorp Vault these should be used. They offer better security and have more features. TUPW should only be used if a key management system is not available.

The idea of TUPW is to store secrets in an encrypted form and to distribute the elements the key is derived from, so it is not found in a single place.

Because of the encryption an attacker that breaks the application and is able to access it's files and environment variables will see something like

61p2nc5NgP9XGXZk9V6n7DZ8964J1pK2nh2nZpjcjxJ5zN9HxHVDVJ3hDp6Nd6JdhC8pX2hx74Pd88J45PZ38XpxtdPc79x5x65kxVdN6cv5k35VnKVPNc8K92vxhN4HnG8T1tkTXNtKNJhP3Gk8Cg4JP88x85vcx529vxGGNdNVNnHNjXgZgK7tT

instead of

Very1Very2Very3SécurePasswôrd?!

One can store this encrypted form in config files. If one use OpenShift, Kubernetes, GitLab or any other software that puts secrets in environment variables, files or imagePullSecrets, these secrets can also be encrypted with TUPW.

This is especially useful as environment variables show up in logs and memory dumps. If the secret is stored unencrypted it can be read in clear by anyone who has access to the logs and the memory dumps. Also, everbody who has some kind of access to a pod can echo the environment variable or cat the file. TUPW helps here in that the secret is nowhere stored in clear text format.

To encrypt the data two keys are needed:

  1. An encryption key
  2. An HMAC key for integrity

Both keys are generated by calculating the HMAC-SHA-256 value of some bytes that are supplied from outside the program, like e.g. the contents of a file, of environment variables, or some other values. The above mentioned keys are derived from this HMAC of the data that is supplied to the classes used by TUPW.

The HMAC to generate both the keys needs itself a key that is provided by the application. So both keys are calculated from something that is "known" to the program only (the HMAC key) and something that is in "posession" of the program (the source bytes or the file) and an optional "subject" string. It is not possible to specify a key directly. The key is always calculated from the different parts, so that an attacker would need to get hold of all the components the key is derived from.

One of the interfaces expects a file which should be stored in a directory that is only accessible by the user that runs the application and nobody else.

Attention: The key sources or any other part the key is derived from must not be stored in the repository.

So the keys are generated from the following parts:

  1. The content of a file or the contents of some other bytes from outside the program
  2. The key that the program uses
  3. The subject string (optional)

By distributing the elements that both keys are derived from between the application and several external entities an attacker needs to have access to all of these elements. Most attackers will not be able to do so and so will not be able to get at the keys.

In a docker environment one can place a file in the docker image and delete it in the running container after it has been used for the instantiation of the class that implements the encryption. This way an attacker will not be able to access a part the keys are generated from and will have a harder time getting at them.

Format

The encrypted data is stored as four parts separated by a special character:

  1. The format code:
    • 1 ={IV}{AES-128-CFB-ABytPadding}{HMAC} (Encoded as Base64 with $ as the field separator)
    • 2 ={IV}{AES-128-CTR-ABytPadding}{HMAC} (Encoded as Base64 with $ as the field separator)
    • 3 ={IV}{AES-128-CTR-Blinded-Data-and-RandomPadding}{HMAC} (Encoded as Base64 with $ as the field separator)
    • 4 ={IV}{AES-128/256-CBC-Blinded-Data-and-RandomPadding}{HMAC (wrong when subject present)} (Encoded as Base64 with $ as the field separator)
    • 5 ={IV}{AES-128/256-CBC-Blinded-Data-and-RandomPadding}{HMAC} (Encoded as Base64 with $ as the field separator)
    • 6 ={IV}{AES-128/256-CBC-Blinded-Data-and-RandomPadding}{HMAC} (Encoded in custom Base32 with 1 as the field separator)
  2. The IV
  3. The data encrypted with the method specified in the format code
  4. The HMAC of the format code, the IV and the encrypted data

This format uses the following fields:

  • The initialization vector used for encryption
  • The type of encryption (AES 128 bits or 256 bits)
  • The encryption mode
  • The padding or blinding
  • Integrity protection by HMAC

All parts except the format code are encoded in a custom version of Base32. Former versions used Base64. However, Base64 uses special characters + and / which make it difficult to copy a resulting encrypted string in an editor.

The custom version of Base32 uses a subset of characters that does not contain any vowels, so there will be no words formed accidentely by the encryption. Also there are no characters that can be easily confused with other characters like e.g. l, 1 and I or O and 0. The 1 character is only used as the separator.

The only drawback of the Base32 encoding is that is about 40% longer than the Base64 encoding. But it is still shorter than using the hexadecimal representation of the encrypted values.

The encrypted data can only be decrypted with the same key sources and the same subject string.

Programming

The name space for the library is TUPWLib. This is a change from the former version that used another name space.

The source code is compatible with .NET 6. One can use the same source code for .NET Framework 4.8 and .NET 6. The solution (.sln) and project (.vbproj) files in this repository are made for .NET Framework 4.8. If one wants to use .NET 6 or later one just has to set up a .NET 6 library project and import the files in the Arrays, Crypto, Numbers and Statistics folders.

Classes and methods

The library provides a base class that provides the interface for encryption: TUPWLib.SplitKeyEncryption.

This class has a constructor with the following signature:

Parameter Type Length Meaning
hmacKey Byte() 32 The key used for the HMAC function of to calculate the encryption and integrity keys
sourceBytes 1 Byte() Any number of byte arrays that are used for calculating the encryption and integrity keys
... . .
sourceBytes n Byte()

The instance created can then be used for encryption and decryption.

Encryption

All encryption methods are called with the data to encrypt which can be byte arrays, character arrays or strings. The result is always a string.

Optionally one can provide a subject string as the second parameter. This parameter is used to modify the encryption key. This may be used to encrypt data with the same HMAC key and source bytes with different keys. A typical scenario would be to add a sort of label to the data like dbPassword or MyAppArtifactoryReadToken.

Method Meaning
EncryptData(Byte()) As String Encrypt the supplied byte array with the keys generated by the constructor
EncryptData(Byte(), String) As String Encrypt the supplied byte array and modify the keys with the supplied subject
EncryptData(Char()) As String Encrypt the supplied character array with the keys generated by the constructor
EncryptData(Char(), String) As String Encrypt the supplied character array and modify the keys with the supplied subject
EncryptData(String) As String Encrypt the supplied string wuth the keys generated by the constructor
EncryptData(String, String) As String Encrypt the supplied string and modify the keys with the supplied subject

IMPORTANT: Strings are immutable. If you call the methods with clear text as strings it is not possible to clear them from memory. It is preferable to use the methods with byte and character arrays.

Decryption

All decryption methods are called with the encrypted string and return either a byte array, a character array or a string.

Optionally one can provide a subject string as the second parameter. This parameter is used to modify the decryption key. This may be used to decrypt data with the same HMAC key and source bytes with different keys. A typical scenario would be to add a sort of label to the data like dbPassword or MyAppArtifactoryReadToken.

For decryption to work, one has to use either the same instance or call the constructor with exactly the same data as for encryption. Additionally, if a subject has been used for encryption exactly the same subject must be used for decryption.

Method Meaning
DecryptDataAsByteArray(String) As Byte() Decrypt the supplied string with the keys generated by the constructor and return the decrypted data as a byte array
DecryptDataAsByteArray(String, String) As Byte() Decrypt the supplied string with the keys modified with the supplied subject and return the decrypted data as a byte array
DecryptDataAsCharacterArray(String) As Char() Decrypt the supplied string with the keys generated by the constructor and return the decrypted data as a character array
DecryptDataAsCharacterArray(String, String) As Char() Decrypt the supplied string with the keys modified with the supplied subject and return the decrypted data as a character array
DecryptDataAsString(String) As String Decrypt the supplied string with the keys generated by the constructor and return the decrypted data as a string
DecryptDataAsString(String, String) As String Decrypt the supplied string with the keys modified with the supplied subject and return the decrypted data as a string

IMPORTANT: Strings are immutable. If you call the DecryptDataAsString methods it is not possible to clear the decrypted data from memory. It is preferable to use the methods with byte and character arrays.

Usage with files as source bytes

Aditionally, there is a class TUPWLib.FileAndKeyEncryption where the constructor uses the following parameters:

Parameter Type Length Meaning
hmacKey Byte() 32 The key used for the HMAC function of to calculate the encryption and integrity keys
filePath String The path to a file whose contents will be used to generate the encryption and integrity keys

This class is a convenience wrapper around the SplitKeyEncryption class where the sourceBytes are taken from the specified file. This file may contain any data, like e.g. text, image, audio, video, etc. The content is read once to calculate the keys.

The encryption and decryption methods are the same as those for SplitKeyEncrption.

For decryption to work, one has to use either the same instance or call the constructor with exactly the same data as for encryption. I.e. the contents of the file must be exactly the same. Additionally, if a subject has been used for encryption exactly the same subject must be used for decryption.

Command Line Program

One can write a command line program that uses the interface that is present in this library:

using System;
using TUPWLib;

namespace TUPWCommandLine
{
   /// <summary>
   /// Example program to calculate the encryption of user and password for
   /// technical users.To be called from the command line.
   /// </summary>
   /// <remarks>
   /// Returns with the following exit codes:
   /// 0: Data converted
   /// 1: Error during conversion
   /// 2: Not enough arguments
   /// </remarks>
   class TUPW
   {
      #region Local constants
      private const int MAX_INPUT_BYTES = 50000000;

      #region Static HMAC key
      // There are many ways to specify the HMAC key.
      // One way is simply to use a static HMAC key which is only known to the program.
      // TODO: Do not use this constant byte array. Roll your own!!!!
      private static readonly byte[] HMAC_KEY = {
                  0x53, 0x67, 0xC3, 0x59,
                  0x4B, 0x46, 0x0F, 0xFA,
                  0x15, 0x21, 0x13, 0x6C,
                  0x7F, 0xDD, 0x33, 0x57,
                  0x26, 0xF3, 0x10, 0xA0,
                  0xE9, 0x16, 0xA4, 0x2E,
                  0x9E, 0x15, 0x8E, 0xF4,
                  0x03, 0x04, 0xAA, 0x2C};
      #endregion
      #endregion

      #region Main method
      static void Main(string[] args)
      {
         int exitCode = 0;

         // There have to be at least 3 arguments
         if (args.Length >= 3)
         {

            // Another way is to calculate the HMAC key in a deterministic way
            // TODO: Do not use both HMAC keys. Choose one of them. You may keep the constant HMAC_KEY as a decoy.
            byte[] CALCULATED_HMAC_KEY = CreateHMACKey();

            // There are many other ways to create a HMAC key. Use you imagination.
            using (FileAndKeyEncryption myEncryptor = new FileAndKeyEncryption(HMAC_KEY, args[1]))
            {
               // We assume that there is no subject
               String subject = "";
               int itemIndex = 2;  // Argument index of part to encrypt/decrypt is 2 if there is no subject

               // If there are at least 4 arguments we assume that there is a subject present
               if (args.Length >= 4)
               {
                  subject = args[2];  // Subject is argument 2
                  itemIndex++;        // Item is argument 3
               }

               if (args[0].Substring(0, 1).Equals("e", StringComparison.OrdinalIgnoreCase))
               {
                  Console.Out.WriteLine(myEncryptor.EncryptData(GetInputFromWhereEver(args[itemIndex]), subject));
               }
               else
               {
                  char[] decryptedOutput = myEncryptor.DecryptDataAsCharacterArray(GetInputFromWhereEver(args[itemIndex]), subject);

                  Console.Out.WriteLine(decryptedOutput);

                  // Clear decrypted output after use
                  Array.Clear(decryptedOutput, 0, decryptedOutput.Length);
               }
            }
         }
         else
         {
            Console.Error.WriteLine("Not enough arguments.");
            Console.Error.WriteLine();
            Console.Error.WriteLine("Usage:");
            Console.Error.WriteLine("   tupwcommandline.exe encrypt {keyfile} [subject] {clearItem}");
            Console.Error.WriteLine("   tupwcommandline.exe decrypt {keyfile} [subject] {encryptedItem}");
            Console.Error.WriteLine();
            Console.Error.WriteLine("If {clearItem}, or {encryptedItem} is '-' input is read from stdin.");
            Console.Error.WriteLine("This makes it possible to use the program in a pipe.");

            exitCode = 2;
         }

         Environment.ExitCode = exitCode;
      }
      #endregion

      #region Private methods
      /// <summary>
      /// Implements a method that creates a deterministic HMAC key from
      /// a pseudo-random number generator with as fixed key.
      /// </summary>
      /// <returns>The deterministic HMAC key.</returns>
      private static byte[] CreateHMACKey()
      {
         byte[] result = new byte[32];
         // TODO: Do not use this seed constant. Roll your own!!!!
         XorRoShiRo128PlusPlus xs128 = new XorRoShiRo128PlusPlus(0x5A7F93DDD402915AL);

         for (int i = 0; i < result.Length; i++)
            result[i] = xs128.GetByte();

         return result;
      }

      /// <summary>
      /// Get input either from the command line, or from stdin if third argument
      /// is "-".
      /// </summary>
      /// <param name="anArgument"> The command line argument that is either the data, or "-".</param>
      /// <returns>Either the argument or input from <see cref="Console.In"/>.</returns>
      static string GetInputFromWhereEver(string anArgument)
      {
         string result;

         // Get input from System.in, if third argument is "-", or from the
         // third command line argument, if it is something else
         if (anArgument.Equals("-"))
            result = GetSystemInAsString();
         else
            result = anArgument;

         return result;
      }

      /// <summary>
      /// Convert <see cref="Console.In"/> input stream to a <see cref="string"/>.
      /// </summary>
      /// <returns>String from <see cref="Console.In"/>.</returns>
      /// <exception cref="ArgumentException">Thrown if input string is too large.</exception>
      static string GetSystemInAsString()
      {
         string consoleInput = Console.In.ReadLine();

         if (consoleInput.Length > MAX_INPUT_BYTES)
            throw new ArgumentException("Input from input stream is larger than " + string.Format("{0:#,##0}", MAX_INPUT_BYTES) + " bytes");

         return consoleInput;
      }
      #endregion
   }
}

It can be used like this ('d:\someimage.jpg' is the name of the key file):

tupw.exe encrypt d:\someimage.jpg strangeness "Very1Very2Very3SécurePasswôrd?!"

This generates (for example) the following output:

61p2nc5NgP9XGXZk9V6n7DZ8964J1pK2nh2nZpjcjxJ5zN9HxHVDVJ3hDp6Nd6JdhC8pX2hx74Pd88J45PZ38XpxtdPc79x5x65kxVdN6cv5k35VnKVPNc8K92vxhN4HnG8T1tkTXNtKNJhP3Gk8Cg4JP88x85vcx529vxGGNdNVNnHNjXgZgK7tT

Note that the "iv" part (the one after the first separator character) of the encryption will change with each invocation of the program as it is derived from a secure random number generator and hence the result of the encryption (which uses the random iv) and also the HMAC will be different, as well, even if the same key file is used in all of these invocations.

Of course, one would need the keyfile and the corresponding program to decrypt this like so:

tupw.exe decrypt d:\keyfile.bin strangeness 61p2nc5NgP9XGXZk9V6n7DZ8964J1pK2nh2nZpjcjxJ5zN9HxHVDVJ3hDp6Nd6JdhC8pX2hx74Pd88J45PZ38XpxtdPc79x5x65kxVdN6cv5k35VnKVPNc8K92vxhN4HnG8T1tkTXNtKNJhP3Gk8Cg4JP88x85vcx529vxGGNdNVNnHNjXgZgK7tT

which yields (with the correct key file):

Very1Very2Very3SécurePasswôrd?!

This way one can store the credentials and the key file in configuration management systems without storing them in the clear.

Note that "strangeness" is the optional "subject" parameter. It can have any value you like and is used to modify the encryption key. It may also be not present, at all.

The decryption part of the program would typically be copied and used in an application to decrypt the credentials in the configuration file.

The program can also be used in a pipe to decode a file like this:

tupw.exe tupw.jar decrypt d:\keyfile.bin - < cat encrypted-secret.config > plain.config

The trailing '-' tells the program that the input comes from stdin and not from the command line. This makes it possible to decrypt a secret configuration file, use it to start a server and then remove it after the sever has been started.

Of course, this is not perfectly safe, as an attacker can get access to the machine and extract the key sources and the program classes and reverse engineer the way the key is calculated.

This program just makes it harder to get at the credentials, as the key sources, the program code and the subject are needed to reconstruct the encryption key. If an attacker manages to take over the server or container, he will be able to reconstruct the key. It is just a matter of time and effort. But in this case even a key management system will not help, at all.

Important

It is the responsibility of the user of the program or the library that the same initialization vector (iv) is never used twice or more. The iv is the second part of the string after the first separator character. In practice the pseudo random number generator is very unlikely to emit the same iv more than once. But it is possible! So check the iv and if that one has been used before, run the program once again to get a unique value.

The special case of (double) quotes

If the data that is to be encrypted contains special characters it is always a wise idea to put them in quotes (*nix) or double quotes (Windows).

If the data contains quotes or double quotes (") things get really messy as what the encryptor sees depends on the operating system.

Here are some examples:

OS Argument Data the program "sees"
Windows Bla"Bli BlaBli
Windows 'Bla"Bli' 'Bla"Bli'
*nix Bla""Bli BlaBli
*nix 'Bla"Bli' Bla"Bli
*nix "Bla$Bli" Bla

Under Windows just always enclose the data in double quotes. The above example will work correctly if one specifies "Bla""Bli". Attention: Do not use single quotes under Windows as 'Bla"Bli' will be transferred to the command line program as 'Bla"Bli', i.e. the quotes are preserved.

Under *nix always enclose the data in single quotes or use an escape character (\) before the special character. The above example will work correctly if one uses "Bla\"Bli". Attention: Do not use double quotes if the data contains '$' characters. The shell will consider everything after the '$' sign to be the name of an environment variable which very likely will not exist and therefore be empty.

So, enclosing the data in quotes is a good idea under *nix but a bad idea under Windows. Enclosing the data in double quotes is a good idea under Windows but a bad idea under *nix.

Classes

There are two different classes that are used as interfaces, both of whoch are located in the dbscryptolib path:

  1. SplitKeyEncryption
  2. FileAndKeyEncryption

Class SplitKeyEncryption is the base class and uses a HMAC key and a number of bytes arrays as the sources for key calculation.

Class FileAndKeyEncryption uses a HMAC key and the contents of a file for key calculation. It is implemented as a wrapper around SplitKeyEncryption that reads the contents of the file and passes them on to SplitKeyEncryption. This class is provided as a convenience as it was the first (and then only) method to call the encryption used by TUPW.

The "SplitKeyEncryption" class is used like in the following example:

      ''' <summary>
      ''' Implements a method that creates a deterministic HMAC key from
      ''' a pseudo-random number generator with as fixed key.
      ''' </summary>
      ''' <returns>The deterministic HMAC key.</returns>
      Private Shared Function CreateHMACKey() As Byte()
         Dim result As Byte() = New Byte(0 to 31) { }
         ' TODO: Do not use this seed constant. Roll your own!!!!
         Dim xs128 As XorRoShiRo128PlusPlus = New XorRoShiRo128PlusPlus(0x5A7F93DDD402915AL)

         For i As Integer = 0 To result.Length - 1
            result[i] = xs128.GetByte()
         Next i

         Return result
      End Function

   ...

   ' Calculate the HMAC_KEY in a deterministic way
   Dim CALCULATED_HMAC_KEY As Byte() = createHMACKey()

   ''' <summary>
   ''' Character encoding (UTF-8) for conversion between characters and bytes.
   ''' </summary>
   Private Shared ReadOnly CHARACTER_ENCODING_FOR_DATA As Encoding = New UTF8Encoding(False, True) ' UTF-8 character encoding *with* error detection

   ...

   Get some reproducible content from outside the program, like environment variables, configuration variables, file contents, data from RPC calls, etc.
   Examples are
      CHARACTER_ENCODING_FOR_DATA.GetBytes(Environment.GetEnvironmentVariable("SOME_ENV_VARIABLE"))
      some_byte_array_from_an_external_source
	   some_bytes_from_a_file
      CHARACTER_ENCODING_FOR_DATA.GetBytes(some_configuration_string)
      some_data_from_an_rpc

   ...

   Dim decryptedData As Char()

   Using myEncryptor = new SplitKeyEncryption(CALCULATED_HMAC_KEY, some_bytes_1, some_bytes_2, some_bytes_3))

      ' Clear all bytes that have been used for the instantiation
      Array.Clear(some_bytes_1, 0, some_bytes_1.Length)
      Array.Clear(some_bytes_2, 0, some_bytes_2.Length)
      Array.Clear(some_bytes_3, 0, some_bytes_3.Length)

      ' Never store a password or a secret as a string as strings are immutable and can be gathered from a memory dump!
      decryptedData = MyEncryptor.DecryptDataAsCharacterArray(dataToDecrypt, subject)
   End Using

   ' TODO: Do whatever you need to do with the decrypted data

   ...

   ' Now delete the decrypted data from memory if you no longer need it. That can not be done with a string.
   Array.Clear(decryptedData, 0, decryptedData.Length)

One can also use a constant HMAC key and take the external bytes the key is calculated from from a file:

   ''' <summary>
   ''' Static HMAC key to be used for encryption which is only known to the program.
   ''' </summary>
   Private Shared ReadOnly HMAC_KEY As Byte() = {&HC1, &HC2, &HC8, &HF,
      &HDE, &H75, &HD7, &HA9,
      &HFC, &H92, &H56, &HEA,
      &H3C, &HC, &H7A, &H8,
      &H8A, &H6E, &HB5, &H78,
      &H15, &H79, &HCF, &HB4,
      &H2, &HF, &H38, &H3C,
      &H61, &H4F, &H9D, &HDB}

   ...

   Dim decryptedData As Char()

   Using myEncryptor = new SplitKeyEncryption(CALCULATED_HMAC_KEY, some_bytes_1, some_bytes_2, some_bytes_3))

      ' Clear all bytes that have been used for the instantiation
      Array.Clear(some_bytes_1, 0, some_bytes_1.Length)
      Array.Clear(some_bytes_2, 0, some_bytes_2.Length)
      Array.Clear(some_bytes_3, 0, some_bytes_3.Length)

      ' Never store a password or a secret as a string as strings are immutable and can be gathered from a memory dump!
      decryptedData = MyEncryptor.DecryptDataAsCharacterArray(dataToDecrypt, subject)
   End Using

   ' TODO: Do whatever you need to do with the decrypted data

   ...

   ' Now delete the decrypted data from memory if you no longer need it. That can not be done with a string.
   Array.Clear(decryptedData, 0, decryptedData.Length)

The class instances then generate the keys from the HMAC and the supplied bytes and store these keys safely in the program's memory.

The classes are meant to be instantiated once and then used throughout the lifetime of the program as needed. They should not be instantiated every time they are used as checking the supplied bytes and calculating the keys is quite expensive. The class stores the calculated key in a secure manner in an instance of the ProtectedByteArray class which can be found in the Crypto source directory.

The supplied bytes and the key sources may have any name and any old content. There is no special format. They should not be empty.

As mentioned above, it is not necessary that the HMAC key is stored in the program as a byte array. It can be generated in any form that seems fit. The only requirement is, that it should be something that is generated in or supplied by the program binary. E.g., one could also use a number generator or some kind of calculation that may be controlled by some configuration parameter.

Blinding

"Blinding" means that the data to be encrypted is prepended and appended with random bytes of varying lengths. These blinders are chosen so that the resulting "blinded" data has a least a length of the AES block size plus 1 byte which results in two AES blocks padded with random bytes. This effectively "blinds" the true length of the source data, if it is shorter than 29 bytes.

Blinded data has the following data structure:

Field Length (in bytes)
Length of prepended data 1
Length of appended data 1
Length of source text as compressed integer 1-4
Prepended data Variable
Source text Variable
Appended data Variable

A "compressed integer" encodes an unsigned integer in a variable length format. The first two bits of the first byte determine the length of the compressed integer:

First bits Length (in bytes) Valuation
00 1 0 - 63
01 2 64 - 16,447
10 3 16,448 - 4,210,751
11 4 4,210,752 - 1,077,952,575

Contributing

Feel free to submit a pull request with new features, improvements on tests or documentation and bug fixes.

Contact

Frank Schwab (Mail)

License

TUPW is released under the Apache license, V2.0. See "LICENSE" for details.

About

Safely store credentials in secrets, environment variables and config files

Resources

License

Stars

Watchers

Forks

Packages

No packages published