#secret #encryption #security #secret-store #client-secret

securestore

SecureStore API for creating or decrypting user secrets

5 releases

0.100.0 Aug 2, 2022
0.99.3 Jul 8, 2020
0.99.2 Feb 22, 2020
0.99.1 Jan 28, 2020
0.99.0 Jan 21, 2020

#824 in Cryptography

Download history 34/week @ 2024-06-10 38/week @ 2024-06-17 21/week @ 2024-06-24 4/week @ 2024-07-01 80/week @ 2024-07-08 19/week @ 2024-07-15 56/week @ 2024-07-22 24/week @ 2024-07-29 55/week @ 2024-08-05 72/week @ 2024-08-12 41/week @ 2024-08-19 53/week @ 2024-08-26 80/week @ 2024-09-02 31/week @ 2024-09-09 72/week @ 2024-09-16 50/week @ 2024-09-23

239 downloads per month
Used in 2 crates

Apache-2.0 OR MIT

57KB
732 lines

Rust SecureStore library

crates.io docs.rs

This crate contains a rusty implementation of the open SecureStore secrets storage protocol, that can read, write and update encrypted password storage files that are designed to be stored alongside your code in your GIT repository (or wherever else).

You can read more about SecureStore on our website. The associated command-line client for managing the secrets store (creating a new store, adding, removing, and updating secrets) can also be found in this repository.

SecureStore API

The API for using SecureStore is primarily self-documenting and intentionally kept small. The primary interface is via an instance of SecretsManager, which can only be created from scratch via SecretsManager::new(..) or loaded from an existing on-disk store via SecretsManager::load(..).

In the usual case, a SecureStore is created and updated via the command line, and the SecureStore API is only used at runtime to retrieve and decrypt secrets individually. A SecureStore is decrypted via either a password or a keyfile, and both the API and the command line interface provide a means of creating a password-encrypted store but exporting a keyfile for use by the application at runtime.

Sample usage

As an example of its usage, including a brief demonstration of ssclient, the CLI companion to this library (also available via crates.io and installable with cargo), can be seen below:

# First, install ssclient, the SecureStore CLI interface
~> cargo install ssclient

# Use ssclient to create a new store with password-based encryption,
# and export the derived keyfile so we can use the SecureStore API
# in a passwordless fashion.
~> ssclient create secrets.json --export-key secrets.key
Password: ***********
Confirm password: ***********

# Add a secret to the store. When -s/--store is not specified,
# defaults to secrets.json
~>  ssclient set foo EXtRAsuPErSECRET
Password: ***********

Back in the world of code, we can now use the SecureStore API from this crate to interface with the secrets file we just created, and selectively decrypt its contents with either the password we used at the time the store was created or the in a passwordless manner by means of the keyfile we exported that contains the key derived from our password:

use securestore::{KeySource, SecretsManager};

fn get_api_key() -> String {
    let sman = SecretsManager::load("secrets.json",
                KeySource::File("secrets.key")).unwrap();
    let api_key = sman.get("foo").unwrap();

    assert_eq!("EXtRAsuPErSECRET", api_key.as_str());
    return api_key;
}

The SecureStore API also includes the relevant APIs for creating new stores; adding, removing, and updating secrets; exporting keyfiles; and everything else typically done with the ssclient CLI companion (which is built on this crate for maximum dogfooding).

Encryption details

SecureStore intentionally does not expose the cryptography innards as part of its API, the particulars of the cryptography algorithms used are considered hard-coded dependent on the schema version. The format itself is written to be forward-compatible such that if and when a need arises for a change in the underlying cryptography format, it can be done in a manner transparent to the API consumer.

It is important that the choice of cryptographic primitives be made taking into account the availability of the chosen algorithms across different languages and platforms, as SecureStore is intended to be an open format with cross-compatible implementations available in different languages supporting many different environments. A conscious decision has been made to also reduce the need for third party dependencies where possible. For the current SecureStore schema (v3), an authenticated variant of AES-128-CBC is used, with two separately-derived/generated keys being used for the AES encryption and the HMAC-SHA1 authentication rounds. When used with user-supplied passwords, PBKDF2 with 256,000 rounds of SHA1 and a unique seed is used to derive the separate keys; the results of the key-stretching operation are not included in the store and are still considered to be sensitive data interchangeable with the password itself.

At this time, OpenSSL is used for all cryptographic operations (including CSPRNG), but that may be replaced with platform-native dependencies in the future. For more details, please refer to the source code.

License and authorship

The SecureStore crate was originally developed by Mahmoud Al-Qudsi of NeoSmart Technologies and is actively updated and maintained by NeoSmart Technologies and the SecureStore contributors. The SecureStore crate is released under a dual MIT and Apache 2.0 License. Any contributions to this crate are assumed to be licensed likewise; contributions not under the both of these licenses are not being accepted at this time.

See also

Dependencies

~2.5–4MB
~92K SLoC