Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expose External Crypto providers #345

Open
trixpan opened this issue Aug 27, 2015 · 3 comments
Open

Expose External Crypto providers #345

trixpan opened this issue Aug 27, 2015 · 3 comments

Comments

@trixpan
Copy link

trixpan commented Aug 27, 2015

It would be great to be able to use externally produced RSA public keys to encrypt backups and to decrypt using RSA private keys.

Ideally this method should support external key provider so that users could store their backup keys using safer mechanisms such as smartcards (rather than passphrases only).

@emory
Copy link

emory commented Sep 18, 2015

My work-around is a static password on a Yubikey with a brain salt of a shorter memorable phrase appended to it. e.g. 'lkjasdfkljasdf8#$#$#$3423@3$89u..jkasdfjklasdf8348347283123kASKJKDFAFSDFduck-pony-boy'

@trixpan
Copy link
Author

trixpan commented Sep 18, 2015

@emory Is is a smart workaround but doesn't address the main issue: User input of the password, you still need top type your brain salt and the password into the system you are backing up.

Had we the ability to use Public Key encryption I could for example have multiple systems doing automated backups to a single location, all using the same public keys, and yet, none of them knowing private key used to protect the data.

The relevance of this feature is highlighted by the following section of the documentation:

Note For automated backups the passphrase can be specified using the ATTIC_PASSPHRASE environment variable.

(PS: I realise most asymmetric key encryption systems use public keys in combination with symmetric algorithms and passwords in order to achieve desirable encryption performance).

@emory
Copy link

emory commented Sep 21, 2015

Understood, I'd be fine using a PKCS/X.509 method personally, but I imagine a gnupg-derived method would work as well for most people too (and then you'd have the benefit of a key agent).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants