11# [ ![ CircleCI] ( https://circleci.com/gh/malnick/cryptorious.svg?style=svg )] ( https://circleci.com/gh/malnick/cryptorious )
22
3- Like 1Password but for the CLI. Stores your encrypted data in eyaml using generic SSH keys as the basis for encryption/decryption so you never have to type a password to get your passwords ever again.
4-
5- ## Download
6- ### Linux
7- - AMD64 | [ v1.2.1] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.2.1 )
8- - AMD64 | [ v1.2.0] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.2.0 )
9- - AMD64 | [ v1.1.0] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.1.0 )
10- - AMD64 | [ v1.0.0] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious )
11-
12- ### Darwin (OSx)
13- - AMD64 | [ v1.2.1] ( https://dl.dropboxusercontent.com/u/77193293/tools/cryptorious_1.2.1_darwin )
3+ Like 1Password but for the CLI.
144
155## Manpage
166### Main Menu
177```
18- NAME:
19-
20- _________ __ .__
8+ _________ __ .__
219 \_ ___ \ _______ ___.__.______ _/ |_ ____ _______ |__| ____ __ __ ______
2210 / \ \/ \_ __ \< | |\____ \ \ __\ / _ \ \_ __ \| | / _ \ | | \ / ___/
23- \ \____ | | \/ \___ || |_> > | | ( <_> ) | | \/| |( <_> )| | / \___ \
11+ \ \____ | | \/ \___ || |_> > | | ( <_> ) | | \/| |( <_> )| | / \___ \
2412 \______ / |__| / ____|| __/ |__| \____/ |__| |__| \____/ |____/ /____ >
25- \/ \/ |__| \/
13+ \/ \/ |__| \/
2614 - CLI-based encryption for passwords and random data
2715
2816USAGE:
2917 cryptorious [global options] command [command options] [arguments...]
30-
31- VERSION:
32- 1.2.1
33-
18+
3419AUTHOR(S):
35- Jeff Malnick <malnick@gmail.com>
36-
20+ Jeff Malnick <malnick@gmail.com>
21+
3722COMMANDS:
38- rename Rename an entry in the vault
39- rotate Rotate your cryptorious SSH keys and vault automatically
40- delete Remove an entry from the cryptorious vault
41- decrypt Decrypt a value in the vault `VALUE`
42- encrypt Encrypt a value for the vault `VALUE`
43- generate Generate a RSA keys or a secure password.
23+ rename Rename an entry in the vault
24+ delete Remove an entry from the cryptorious vault
25+ decrypt Decrypt a value in the vault `VALUE`
26+ encrypt Encrypt a value for the vault `VALUE`
27+ generate Generate a RSA keys or a secure password.
4428
4529GLOBAL OPTIONS:
46- --vault-path, --vp "/home/malnick/.cryptorious/vault.yaml" Path to vault.yaml
47- --private-key, --priv "/home/malnick/.ssh/cryptorious_privatekey" Path to private key
48- --public-key, --pub "/home/malnick/.ssh/cryptorious_publickey" Path to public key
49- --debug Debug/Verbose log output
50- --help, -h Show help
51- --version, -v Print the version
30+ --vault-path, --vp "/Users/malnick/.cryptorious/vault.yaml" Path to vault.yaml.
31+ --debug Debug/Verbose log output.
32+ --help, -h show help
33+ --version, -v print the version
34+ ```
5235
36+ ### Encrypt Sub Menu
5337```
38+ NAME:
39+ encrypt - Encrypt a value for the vault `VALUE`
40+
41+ USAGE:
42+ encrypt [command options] [arguments...]
43+
44+ OPTIONS:
45+ --key-arn KMS key ARN
46+ ```
47+
5448### Decrypt Sub Menu
5549```
5650NAME:
@@ -64,6 +58,7 @@ OPTIONS:
6458 --goto, -g Open your default browser to https://<key_name> and login automatically
6559 --timeout, -t "10" Timeout in seconds for the decrypt session window to expire
6660```
61+
6762### Rename Sub Menu
6863```
6964NAME:
@@ -76,6 +71,7 @@ OPTIONS:
7671 --old, -o Name of old entry name [key] in vault
7772 --new, -n Name of new entry name [key] in vault
7873```
74+
7975### Generate Sub Menu
8076```
8177NAME:
8581 generate command [command options] [arguments...]
8682
8783COMMANDS:
88- keys Generate SSH key pair for cryptorious
89- password [--[l]ength] Generate a random password
84+ password [--[l]ength] Generate a random password
9085
9186OPTIONS:
9287 --help, -h show help
@@ -99,36 +94,25 @@ Build it and install: `make install`
9994
10095Add to your ` .[bash | zsh | whatever]rc ` : ` alias cpt=cryptorious `
10196
102- ## Step 1: Generate keys
97+ ## Step 1: Add KMS keys to AWS
98+ NOTE: will add cmd for this soon
10399
104- ```
105- cryptorious generate keys
106- ```
107-
108- Defaults to placing keys in ``` $HOME/.ssh/cryptorious_privatekey ``` and ``` $HOME/.ssh/cryptorious_publickey ``` .
109-
110- You can override this with ``` --private-key ``` and ``` --public-key ``` :
111-
112- ```
113- cryptorious generate keys --private-key foo_priv --public-key foo_pub
114- ```
115-
116- ### Lock It Down
117- If you want to win extra security stars, lock down your keys with root ownership. By default they're already read/write by the user who ran the ` cryptorious ` command (0600), but you can increase this security more with ` chmod root:root ~/.ssh/cryptorious_privatekey ` . Now you'll have to run ` cryptorious ` with ` sudo ` and enter in your root password (ugh, passwords..) every time.
100+ In your own AWS account, add a KMS key and grant your IAM user access.
118101
119102## Step 2: Encrypt
103+ NOTE: will add flag for AWS profile soon
120104
105+ Use your AWS profile and encrypt some data:
121106```
122- cryptorious encrypt github
107+ AWS_PROFILE=personal cryptorious encrypt --key-arn=<my_kms_key_arn> github.com
123108```
124109
125110Will open a ncurses window and prompt you for username, password and a secure note. All input is optional.
126111
127-
128112## Step 3: Decrypt
129113
130114```
131- cryptorious decrypt thing
115+ AWS_PROFILE=personal cryptorious decrypt thing
132116```
133117
134118Will open a ncurses window with the decrypted vault entry.
@@ -144,19 +128,6 @@ If you've saved your vault entries with the URI of the site they belong to (i.e.
144128cpt d -g -c github.com
145129```
146130
147- ## Step 4: Rotate Keys & Vault
148- Compromised your keys? Not a problem.
149-
150- ```
151- cryptorious rotate
152- ```
153-
154- 1 . Backs up your old keys to ` keyPath.bak `
155- 1 . Backs up your old vault to ` vaultPath.bak `
156- 1 . Generates new keys to ` keyPath `
157- 1 . Decrypts vault using ` cryptorious_privatekey.bak ` and encrypts vault in place with new ` cryptorious_publickey `
158- 1 . Writes the vault back to disk at ` vaultPath `
159-
160131## Step 5: Generate Secure Password
161132The ` generate ` command also lets you generate random, secure passwords of ` n ` length:
162133```
0 commit comments