Security News
GitHub Removes Malicious Pull Requests Targeting Open Source Repositories
GitHub removed 27 malicious pull requests attempting to inject harmful code across multiple open source repositories, in another round of low-effort attacks.
supplies key loading and other cryptographic functions needed in secure-scuttlebutt apps.
var ssbkeys = require('ssb-keys')
//usually, load keys like this
var keys = ssbkeys.loadOrCreateSync(filename)
/* => {
id: String,
public: String,
private: String
}*/
//but for testing, .generate() is useful.
var keys = ssbkeys.generate()
/* => {
id: String,
public: String,
private: String
}*/
//hmac_key is a fixed value that applies to _THIS_ signature use, see below.
var obj = ssbkeys.signObj(k, hmac_key, { foo: 'bar' })
console.log(obj) /* => {
foo: 'bar',
signature: ...
} */
ssbkeys.verifyObj(k, hmac_key, obj) // => true
keys
in the below methods, keys
is an object of the following form:
{
"curve": "ed25519",
"public": "<base64_public_key>.ed25519",
"private": "<base64_private_key>.ed25519",
"id": "@<base64_public_key>.ed25519"
}
The format of the id feed is described in the protocol guide - keys and identities
when stored in a file, the file also contains a comment warning the reader
about safe private key security.
Comment lines are prefixed with #
after removing them the result is valid JSON.
Returns the sha256 hash of a given data. If encoding is not provided then it is assumed to be binary.
The SSB ids contain a tag at the end. This function returns it.
So if you have a string like @gaQw6zD4pHrg8zmrqku24zTSAINhRg=.ed25519
this function would return ed25519
.
This is useful as SSB start providing features for different encryption methods and cyphers.
Load a file containing the your private key. the file will also contain a comment with a warning about keeping the file secret.
Works in the browser, or stores the keys is localStorage in the browser.
(web apps should be hosted a secure way, for example web-bootloader)
In the browser, the filename
is used as the localStorage
key.
(note: web workers do not support localStorage, so the browser storage localtion will likely
be changed to indexeddb in the future)
If the file does not exist it will be created. there is also
variations and parts loadOrCreate
(async), load
, create
createSync
loadSync
. But since you only need to load once,
using the combined function is easiest.
keys
is an object as described in keys
section.
If a sync file access method is not available, loadOrCreate
can be called with a
callback. that callback will be called with cb(null, keys)
. If loading
the keys errored, new keys are created.
generate a key, with optional seed.
curve defaults to ed25519
(and no other type is currently supported)
seed should be a 32 byte buffer.
keys
is an object as described in keys
section.
signs a javascript object, and then adds a signature property to it.
If hmac_key
is provided, the object is hmaced before signing,
which means it cannot be verified without the correct hmac_key
.
If each way that signatures are used in your application use a different
hmac key, it means that a signature intended for one use cannot be reused in another
(chosen protocol attack)
The fine details of the signature format are described in the protocol guide
verify a signed object. hmac_key
must be the same value as passed to signObj
.
encrypt a message content to many recipients. msg will be JSON encoded, then encrypted with private-box
recipients
must be an array of feed ids. your own feed id should be included.
the encryption format is described in the protocol guide - encrypting
decrypt a message encrypted with box
. If the boxed
successfully decrypted,
the parsed JSON is returned, if not, undefined
is returned.
the decryption process is described in the protocol guide - decrypting
extract the msg_key
used to encrypt this message, or null if it cannot be decrypted.
the msg_key
if not null, can then be passed to unboxBody
decrypt a message content
with a msg_key
. returns the plaintext message content or null if
this is not the correct msg_key
. The purpose of unboxBody
and unboxKey
is so support
messages that are shared then later revealed.
symmetrically encrypt an object with key
(a buffer)
symmetrically decrypt an object with key
(a buffer)
MIT
FAQs
keyfile operations for ssb
The npm package ssb-keys receives a total of 14 weekly downloads. As such, ssb-keys popularity was classified as not popular.
We found that ssb-keys demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
GitHub removed 27 malicious pull requests attempting to inject harmful code across multiple open source repositories, in another round of low-effort attacks.
Security News
RubyGems.org has added a new "maintainer" role that allows for publishing new versions of gems. This new permission type is aimed at improving security for gem owners and the service overall.
Security News
Node.js will be enforcing stricter semver-major PR policies a month before major releases to enhance stability and ensure reliable release candidates.