FidoVault is a tool to control access to secrets via symmetric encryption and decryption using FIDO2 authenticators. A FidoVault vault file contains a secret encrypted via one or more FIDO2 authenticators, such that the secret is inaccessible without at least one of the authenticators, but any single authenticator can decrypt the secret. A password can optionally be required for decryption in addition to an authenticator.
Caution
Most FIDO2 authenticators cannot be "backed up" or duplicated. If all the authenticators of a particular FidoVault are lost (or "reset"), then that FidoVault will become permanently inaccessible.
Additionally, when FIDO2 authenticators make a credential, they generate two random values, credRandomWithUV
and credRandomWithoutUV
, and associate them with the credential. In the context of an assertion, the former is used when "user verification" (most commonly via the entry of a PIN) is performed and the latter when it is not. Consequently, secrets encrypted by an authenticator when user verification is not performed will not be able to be decrypted by the same authenticator when user verification is performed (and vice versa). For more detailed discussion of this issue and its implications, see here.
Any standard USB authenticator that supports the HMAC Secret Extension (which reportedly most do) should work with FidoVault. NFC and Bluetooth authenticators have not been tested, and PC/SC authenticators are not currently supported. Development and testing have primarily been done using a Yubico Security Key.
FidoVault is written in Python 3, and has the following dependencies:
cryptography
(for symmetric encryption and decryption of secrets)python-fido2
version 1.2.0 (for accessing FIDO2 authenticators)
Note
Be sure to use version 1.2.0 of python-fido2
; FidoVault will not work correctly with earlier versions.
FidoVault should work on any platform on which Python 3 and the above dependencies can be installed, although running under Windows may require administrator privileges, since Windows apparently requires administrator privileges for certain FIDO APIs.
Display usage instructions:
$ fidovault.py -h
usage: fidovault.py [-h] [-v VAULT] [-k KEY] [-i | -a]
Create and manage FidoVaults - control access to secrets via symmetric encryption and decryption using FIDO2 authenticators.
options:
-h, --help show this help message and exit
-v, --vault VAULT FidoVault location
-k, --key KEY use (only) this key section of the FidoVault
-i, --init initialize a FidoVault
-a, --add add a key section to a FidoVault
If neither '--init' nor '--add' are specified, the program will attempt to output the FidoVault's secret to STDOUT.
Initialize a FidoVault:
$ fidovault.py -i -v <vaultname>
Enter secret:
Confirm secret:
Please connect the device you wish to enroll (and disconnect any others).
Press <enter> when ready ...
Checking device at /dev/hidraw2 ...
Device supports the hmac-secret extension.
Creating FIDO2 credential ...
Enter PIN:
Touch your authenticator now ...
FIDO2 credential created.
Enter name for this key section: Blue Key
Perform user verification when using this key section? (y/n - default is y)
Combine password with FIDO2 hmac-secret when using this key section? (y/n - default is y)
Getting hmac-secret ...
Touch your authenticator now ...
Enter password:
Confirm password:
Key section 'Blue Key' successfully added.
FidoVault '<vaultname>' updated.
Add an additional authenticator to an existing FidoVault (connect an already added authenticator before proceeding):
$ fidovault.py -a -v <vaultname>
Checking device at /dev/hidraw2 ...
Credential found on device.
Trying to decode token using 'Blue Key' key section ...
Getting hmac-secret ...
Enter PIN:
Touch your authenticator now ...
Enter password:
Token decryption succeeded.
Please connect the device you wish to enroll (and disconnect any others).
Press <enter> when ready ...
Checking device at /dev/hidraw2 ...
Device supports the hmac-secret extension.
Creating FIDO2 credential ...
Enter PIN:
Touch your authenticator now ...
FIDO2 credential created.
Enter name for this key section: Red Key
Perform user verification when using this key section? (y/n - default is y)
Combine password with FIDO2 hmac-secret when using this key section? (y/n - default is y)
Getting hmac-secret ...
Touch your authenticator now ...
Enter password:
Confirm password:
Key section 'Red Key' successfully added.
FidoVault '<vaultname>' updated.
Output a FidoVault secret:
$ fidovault.py -v <vaultname>
Checking device at /dev/hidraw2 ...
Credential found on device.
Trying to decode token using 'Blue Key' key section ...
Getting hmac-secret ...
Enter PIN:
Touch your authenticator now ...
Enter password:
Token decryption succeeded.
<secret>
FidoVault is designed to be used in conjunction with other programs, by providing a secret to them. For programs that accept a secret on STDIN
, simply pipe FidoVault's STDOUT
to them (all FidoVault user interaction output is written to STDERR
/ /dev/tty
, and so will be printed to the terminal and not redirected to the other program). E.g., to use a FidoVault secret for symmetric encryption and decryption of a file with GnuPG, run:
$ fidovault.py -v <vaultname> | gpg --passphrase-fd 0 --pinentry-mode loopback -c <filename>
and:
$ fidovault.py -v <vaultname> | gpg --passphrase-fd 0 --pinentry-mode loopback --output <filename> -d <filename.gpg>
To open a KeePassXC database with a FidoVault secret as password, run:
$ fidovault.py -v <vaultname> | keepassxc --pw-stdin /path/to/database.kdbx
(Unfortunately, this only works if KeePassXC is not currently running.)
For programs that expect a secret as an argument, FidoVault can pass a secret to them via xargs
. E.g., to open a KeePassXC database with a FidoVault secret as password via D-Bus when KeePassXC is already running, run:
$ fidovault.py -v <vaultname> | xargs qdbus org.keepassxc.KeePassXC.MainWindow /keepassxc org.keepassxc.KeePassXC.MainWindow.openDatabase /path/to/database.kdbx
(On Debian Sid, replace qdbus
with qdbus6
.)
To pass the secret at a position other than the end of the command, use the -I replace-str
argument of xargs
. E.g., to open a KeePassXC database with a FidoVault secret as a password plus a keyfile that resides somewhere in the filesystem via D-Bus, run:
$ fidovault.py -v <vaultname> | xargs -I % qdbus org.keepassxc.KeePassXC.MainWindow /keepassxc org.keepassxc.KeePassXC.MainWindow.openDatabase /path/to/database.kdbx % /path/to/keyfile
Caution
Including a secret in a command's arguments is generally considered insecure, since the secret will be visible to anyone with access to the system process list. The above qdbus
command is additionally insecure since it will place the secret on the D-Bus message bus, which also may be accessible to others.
The original motivation of FidoVault was the desire to implement a standalone tool to open KeePassXC databases with FIDO2 authenticators, but the code quickly evolved into a more general purpose tool. FidoVault's basic architecture was inspired by the discussion here, as well as the design of LUKS plus its systemd-cryptenroll extension. Indeed, I seriously contemplated using LUKS + systemd-cryptenroll (possibly with loop devices) as a general purpose FIDO2-protected secret store, but since LUKS is designed around block devices and the device mapper, it cannot be easily used by non-root users.
Other projects similar to FidoVault:
- tokenring: "TokenRing is a back-end for the Python keyring module, which uses a hard token to encrypt your collection of passwords as a large Fernet token, composed of individual password entries, each of which is separately encrypted as a smaller Fernet token of its own."
- age-plugin-fido: "draft fido plugin for age(1)" ("early draft, likely buggy, protocol not finalized", "usability issues with multiple fido keys", "not actually tested with age(1) yet")
- age-plugin-yubikey: "Encrypt files with fido2 keys that support the "hmac-secret" extension."
- FileKey: "Files need protection. FileKey secures them. Works with Yubikeys. Drop files in. They lock. Drop them again. They unlock. Your data stays on your device, and only you hold the key. Open source and powered by AES-256 encryption—the same standard trusted by the US government for top-secret information." (Reddit announcement thread)
- khefin: "A system for using a FIDO2 authenticator with hmac-secret extension support to generate passphrase-protected secrets." (abandoned a couple of years ago)
FidoVault is absolutely free software, and there is no expectation of any sort of compensation or support for the project. That being said, if anyone wishes to donate (to Thomas More, the tool's primary author), this can be done via the Ko-fi platform.
FidoVault is free / open source software, released under the terms of the GNU GPLv3 or later.