Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 0 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,6 @@ Steps to mitigate the risks:

## TODO

- enforce restricted permissions on the file
- encorce strong password
- version 1.0, with format guarantee
- (later) breaking challenge bounty
Expand Down
5 changes: 5 additions & 0 deletions secretstore/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,11 @@ description = "Store a secret (such as a private key) in an encrypted file"
license = "MIT"
edition = "2021"

[features]
default = [ "unixfilepermissions" ]
# Use UNIX-style file permissions
unixfilepermissions = []

[dependencies]
bitcoin_hashes = "0.16.0"
chacha20poly1305 = "0.10.1"
Expand Down
39 changes: 39 additions & 0 deletions secretstore/src/secretstore.rs
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ use crate::encrypt_xor as xor;
use bitcoin_hashes::Sha256d;
use hex_conservative::{DisplayHex, FromHex};
use std::fs;
#[cfg(feature = "unixfilepermissions")]
use std::os::unix::fs::PermissionsExt;
use zeroize::{Zeroize, ZeroizeOnDrop};

/// Minimum accepted password length
Expand Down Expand Up @@ -141,7 +143,44 @@ impl SecretStore {
path_for_secret_file
));
}

// First create empty file
let f = fs::File::create(path_for_secret_file).map_err(|e| {
format!(
"Error writing to file {}, {}",
path_for_secret_file,
e.to_string()
)
})?;

// Create contents
let encrypted_payload = self.assemble_encrypted_payload(encryption_password)?;

// Set restricted permissions
#[cfg(feature = "unixfilepermissions")]
{
let metadata = f.metadata().map_err(|e| {
format!(
"Error getting file metadata {}, {}",
path_for_secret_file,
e.to_string()
)
})?;
let mut permissions = metadata.permissions();

permissions.set_mode(0o600); // Read/write for owner, no read for others.
assert_eq!(permissions.mode(), 0o600);

let _res = f.set_permissions(permissions).map_err(|e| {
format!(
"Error removing permsissions from file {}, {}",
path_for_secret_file,
e.to_string()
)
})?;
}

// Write out contents
let _res = fs::write(path_for_secret_file, encrypted_payload).map_err(|e| {
format!(
"Error writing to file {}, {}",
Expand Down
6 changes: 5 additions & 1 deletion secretstore/src/test_secretstore.rs
Original file line number Diff line number Diff line change
Expand Up @@ -325,13 +325,17 @@ fn neg_read_from_file_xor_wrong_pw_wrong_result() {

#[test]
fn neg_create_password_too_short() {
let temp_file = get_temp_file_name();
let nonsecret_data = Vec::from_hex(NONSECRET_DATA1).unwrap();
let secret_data = Vec::from_hex(SECRET_DATA1).unwrap();
let store = create_store_from_data(nonsecret_data.clone(), &secret_data);

let short_password = "no";
let res = SecretStoreCreator::write_to_file(&store, "dummy_filename", short_password);
let _res = fs::remove_file(&temp_file);
let res = SecretStoreCreator::write_to_file(&store, &temp_file, short_password);
assert_eq!(res.err().unwrap(), "Password is too short! (2 vs 7)");

let _res = fs::remove_file(&temp_file);
}

#[test]
Expand Down