Save our Secrets (SOS) is a cross-platform, distributed, encrypted database with a focus on security, integrity and redundancy. It can be used to store private secrets such as account passwords, notes, certificates and encryption keys.
This repository contains the core library code and several command line interface (CLI) tools.
A vault is a collection of encrypted secrets. Vaults can be represented as both an append-only log file for synchronization and a compact binary file for archiving and portability. Bi-directional conversion between the append-only log and compact binary file is straightforward; the library provides functions to reduce the append-only log to a vault and split a vault into it's header and a collection of events that can be appended to a log.
Synchronization between nodes is done using an append-only log file of events; a Merkle tree is computed for each log file using the hash of the data for each record. By comparing Merkle proofs we can easily determine which tree is ahead or whether the trees have diverged; much in the same way that git synchronizes source code.
Secrets are always encrypted on the client using a random nonce and one of the supported algorithms, either XChaCha20Poly1305 or AES-GCM 256. The default algorithm is XChaCha20Poly1305 for it's extended 24 byte nonce and because it does not require AES-specific CPU instructions to be implemented safely.
When a node wants to make changes to another node it sends a commit proof of it's current HEAD node and a patch file containing the events to apply to the remote node.
If the remote node has the same HEAD commit then the patch can be applied safely and a success response is returned to the node that made the request; when the calling node gets a success response it applies the patch to it's local copy of the append-only log.
If the remote node contains the HEAD commit then it will send a CONFLICT response and a proof that it contains the calling node's HEAD. The calling node can then synchronize by pulling changes from the remote node and try to apply the patch again.
If a calling node gets a CONFLICT response and no match proof but it contains the HEAD proof returned by the remote node then it can push it's local changes to the remote node and try again.
If a calling node gets a CONFLICT response and no match proof and it does not contain the HEAD proof send by the remote node then it is a hard conflict and will need to be resolved, see Conflicts.
For the networking layer we plan to support three different modes of operation:
SPOT
: Single Point of Truth using a standard client/server architecture.PEER
: Synchronization of nodes using a p2p network.Conflicts are categorised into soft conflicts which can be automatically resolved via synchronization and hard conflicts which may require user approval to be resolved.
Soft conflicts occur when a node tries to make changes to another node but cannot as their commit trees are out of sync but have not diverged. These sorts of conflicts can be resolved by pushing local changes or pulling remote changes to synchronize; if the synchronization is successful the calling node can try again.
The system is eventually consistent except in the case of two events; when a WAL is compacted to prune history or when the encryption password for a vault is changed. Either of these events will completely rewrite the append-only log and therefore the vault commit trees will have diverged. If all nodes are connected when these events occur then it is possible to synchronize automatically but if a node is offline (or an error occurs) then we have a conflict that must be resolved; we call this a hard conflict.
sos
.
audit
command for reading and monitoring audit logs.check
command for verifying file integrity and inspecting files.client
command to launch a login shell for an account.server
server command to run a web server.rendezvous
server for peer to peer nodes.For webassembly bindings see the browser repository.
All program data is stored in this directory:
$HOME/Library/Application Support/SaveOurSecrets
$XDG_DATA_HOME
or $HOME/.local/share/SaveOurSecrets
C:\Users\UserName\AppData\Local\SaveOurSecrets
({FOLDERID_LocalAppData}
)Tasks are run using cargo make
, install it with:
cargo install cargo-make
For webassembly support in the test runner install wasm-pack.
The minimum supported Rust version (MSRV) is 1.68.2; to view the API documentation for all crates run cargo make doc
.
Generate a keypair for the server first:
cargo run -- keypair --public-key tests/server_public_key.txt tests/test.pem
cargo make test
cargo make unit
cargo make integration
For code coverage install the llvm-tools-preview
and grcov
:
rustup component add llvm-tools-preview && cargo install grcov
Then you can run:
cargo make cover
The HTML coverage report is at target/coverage/index.html
.
The server requires TLS so a certificate and key file must be configured.
For local development use mkcert in the sandbox directory, first install the executable and then create the certificate authority:
mkcert -install
Afterwards create certificates for local servers in the sandbox directory:
cargo make dev-certs
Before making a release install the cargo-release tool:
cargo install cargo-release
Perform a release dry run:
cargo release --workspace minor
To skip releasing the crates use --no-publish
:
cargo release --workspace --no-publish minor
Then to cut a new release which will publish the libraries as crates and create a new git tag for the release run:
cargo release --workspace minor -x
The new git tag will trigger a github workflow that will build all the artifacts across the supported platform matrix.
To skip publishing the crates use:
cargo release --workspace -x --no-publish
If you have setup a development environment or installed the command line tools then you can start a server and connect a client.
We will show commands using the executable names but you can also use cargo run
in the program directory.
To begin start a server, for example:
sos server -c sandbox/config.toml
Then in a separate terminal create a new signing key and login vault:
sos client signup -s https://localhost:5053 ./sandbox
This will write the signing key to the sandbox
directory and create a new account on the server. It will also print the keystore passphrase for the signing key and the encryption passphrase for the login vault. For testing you may want to make a note of these, in the real world these passphrases need to be memorized.
Now create a shell session:
sos client shell -s https://localhost:5053 -k ./sandbox/<addr>.json
Where <addr>
should be changed with the public address of the signing key created during signup.
You will be prompted to enter the keystore passphrase, if the signing keystore is decrypted successfully you will be presented with a shell prompt.
To view the list of vaults run the vaults
command; the default vault created when you signed up for a new account is called Login so you can use it; type use Login
to select the login vault.
Now enter your encryption passphrase to unlock the vault.
Once the vault is unlocked you can list, create, update, read and delete secrets and perform other actions such as changing the vault encryption passphrase.
When you have finished making changes remember to lock the vault again with the close
command.
To see the list of available commands type help
at the prompt.
This section describes the basic commands for managing secrets in a shell session; remember you can run help <cmd>
to learn more about each command.
To create a secure note use the add note
command and pass a name for the secret; once you have finished typing the contents of the note enter Ctrl+D
on a newline to save the note. Example output:
``` sos@Login> add note Example ┌───────────────────────────────────────┐ │ │ │ [NOTE] Example │ │ │ │ To abort the note enter Ctrl+C │ │ To save the note enter Ctrl+D on │ │ a newline │ │ │ └───────────────────────────────────────┘
This is an example.
```
To learn how to create other kinds of secrets run help add
.
To read the content of a secret use the get
command:
sos@Login> get Example
┌───────────────────────────────────────┐
│ │
│ [NOTE] Example │
│ │
│ This is an example. │
│ │
└───────────────────────────────────────┘
Use the set
command to update the value of the secret; this will launch the editor defined by the $EDITOR
environment variable.
Save your changes to update the secret.
The delete a secret use the del
command and confirm deletion:
sos@Login> del Example
Delete "Example" (y/n)? y
A server writes audit logs which can be viewed using the sos-audit
tool.
While you make changes to a vault monitor the audit logs:
sos audit monitor sandbox/audit.dat
The changes feed is a stream that networked clients can use to react to changes on other nodes.
You can monitor this stream with:
sos client monitor -s https://localhost:5053 -k sandbox/<addr>.json
Enter your keystore passphrase and then in a shell session make some changes like creating or removing secrets and you should see the events printed to the terminal.