CEMAC - Encrypting sensitive information on GitHub
Overview
Description:
For many repositories, the code is open source some key information such as a password or API key is not to be made public. It would be useful to store this information securely on git, for jupyterhub_on_azure documentation, I highlight some security flaws that should be addressed in the future - not super critical information but not sensible to highlight to the world. This is a perfect case study for trying out git-crypt. Encrypts using GPG keys - i.e. can generate a CEMAC key shared between all CEMAC staff so we can version control and store the sensitive files on the repository.
Requirements:
git (standard on Leeds Centos)
openssl (standard on Leeds Centos)
gpg (standard on Leeds Centos)
Installation:
(UNIX)
See documentation for other platforms.
Very simple install
git clone https://github.com/AGWA/git-crypt.git
make
make install PREFIX=$HOME/SW/bin
$HOME/SW/bin must be in your path to use git-crypt
Credentials
If using setting up new keys go to Encrypting
Exporting cemac keys
gpg --export-secret-key -a "cemacgeneric" > cemac_private.key
gpg --export -a "cemacgeneric" > cemac_public.key
These files can then be securely copied to the target machine and then imported.
Importing the public and private keys
gpg --import cemac_public.key
gpg --allow-secret-key-import --import cemac_private.key
You should see something like
gpg: key 5A5E6934: public key "CEMAC (cemacgeneric) <cemac@leeds.ac.uk>"
imported
gpg: Total number processed: 1
gpg: imported: 1 (RSA: 1)
gpg: no ultimately trusted keys found
gpg: key 5A5E6934: secret key imported
gpg: key 5A5E6934: "CEMAC (cemacgeneric) <cemac@leeds.ac.uk>" not changed
gpg: Total number processed: 1
gpg: unchanged: 1
gpg: secret keys read: 1
gpg: secret keys imported: 1
check gpg --list-secret-keys
shows the cemac key safely in your gpg secring
delete the cemac_private.key
Note: I needed to edit the trust level for the imported key
gpg --edit-key <key_id>
gpg> trust
Encrypting:
(skip to Credentials if unlocking an already git-crypted file)
Generating Keys (skip if using the cemac key)
gpg --gen-key
Select RSA and RSA (default), 4096 bits, doesn’t expire, name and email, (o)kay
I created a key for myself and a cemac key to share
Initialise
cd repo
git-crypt init
Create a .gitattributes file. An example is in this repository
*.key filter=git-crypt diff=git-crypt
Add users to git crypt
git-crypt add-gpg-user USER_ID
e.g.git-crypt add-gpg-user cemac@leeds.ac.uk
Add and commit the file. Push to git.
see secret.key
You can not view the file on git hub or download as plain text.
Cemac staff obtain the cemac-key from cemachelen
Run
git-crypt unlock
to access the file when cloning or pulling.
Decrypting
Once you have installed the cemac key then you can run:
git-crypt unlock
after pulling from or cloning the target repo.
Summary:
This seems like a suitable simple solution to keys and secrets being scattered across individual files spaces.
Alternative:
Encrypt keys with the cemac staffs public key before sharing.
Add users individually with git-crypt i.e. we all store each other’s public keys and add those users - could be annoying to remember to add everyone.
Simply encrypt with a cemac public key so secret files simply read —begin pgp message kakjfshdkfhwrupg –end pgp message. Personal thoughts are that, that is less user friendly.