NoVault: ultra simple and secure password management

NoVault is an ultra simple and secure password manager similar to Master Password but made to be much simpler and more auditable for developer minded people.

As the name implies, NoVault does not require storing your passwords in any kind of file or database. Instead, you remember a single password, which is cryptographically hashed with SHA512 and converted to a string using base64url.

NoVault stores your configuration in a human readable toml file, which you can save on sites like google drive, dropbox or even publically on github -- no passwords are stored in this plain text (except the checkhash for your masterpassword, which is securely hashed).

No vault is written in rust, and uses the rust type system extensively to avoid accidentally serializing either your master password or a site password. Simply grep for audit_this to look for all possible places that information could leak.

Advantages to NoVault over other password managers: - Uses Argon2 for hasing, which is the winner of the 2015 Password Hashing Competition - Simple: completely open source and less than 1000 lines of code - Written in a type safe language (rust) - Your passwords never exist in plain text, html or paste buffer -- NoVault takes control of your keyboard to enter the passwords. - You (should) be safe to store your configuration in plain text anywhere, so it is easy to keep it in sync accross your computers.

(current) disadvantages: - Can only use on linux - Written by a complete amateur over a weekend in his spare time - Not even remotely audited by anyone with any cyrptographic knowledge - Hackers could eat your lunch and I provide no guarantees about the waranty or security of this product, so you can't sue me (sorry). On that note...

**The MIT License (MIT)

Copyright (c) 2017 Garrett Berg, vitiral@gmail.com

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.**

Guide

Installation

The only way to install is through cargo: cargo install novault

Basic Use

choosing a good password Initialize your NoVault config file: novault init

This will ask for a password, choose a good one. It is better to make a long password that you can remember than a short one with lots of symbols. "correct horse battery staple" has high entropy but is pretty easy to remember.

Once you have chosen your password, add a site: ` novault set vitiral@gmail.com --notes "open source email"

Setting the password and 4 digit pin of a bank might be done with: ` novault set vitiral@bank novault set vitiral@bank.pin --pin --fmt '{p:.4}'

The {...} syntax is the same as rust/pthon's string fmt syntax. p is the name of the password and everything after : tells how to format p. :.4 says to use "precision 4" which in this case means string length of 4. If your site requires special characters you can add them like --fmt '{p:.20}!@#'. Obviously the characters don't provide extra security... but you are using a 20 digit random hash which is about as secure as anything can be.

Now you can get the site's password. NoVault will automatically validate that your password is the same one you used in novault init. novault get vitiral@gmail.com novault set myname@bank novault set myname@bank.pin --stdout # just print to stdout

Each of these calls (except with --stdout) will put NoVault in a "hung state". To use your password, bind killall -SIGUSR1 -u $USER novault to a key (I use <WINDOWS>p) and it will control your keyboard to type the password in. It will never use your paste buffer and your password will never be in plain text.

The novault config file is stored in ~/.config/novault.toml by default. It is recommended that you back up this file and distribute it among your computers. I prefer to keep it in revision control on a public github repo.