mirror of
https://github.com/gaschz/qubes-pass.git
synced 2025-03-01 14:22:31 +01:00
README.md updated.
This commit is contained in:
parent
4314d40696
commit
fdf9926264
44
README.md
44
README.md
@ -1,15 +1,51 @@
|
|||||||
# Inter-VM Pass password manager for Qubes OS
|
# Inter-VM Pass password manager for Qubes OS
|
||||||
|
|
||||||
This is a very simple bridge between Qubes OS VMs. With it, you can
|
This is a very simple password management system that lets you
|
||||||
store and retrieve passwords between VMs without having to grant
|
securely store passwords in a compartment fully isolated from
|
||||||
any of the VMs any special policy privileges other than access to the
|
your other compartments.
|
||||||
Qubes services implemented here.
|
|
||||||
|
It accomplishes this feat by by leveraging both
|
||||||
|
the excellent [`pass`](https://passwordstore.org/) program, and
|
||||||
|
Qubes OS IPC to.
|
||||||
|
|
||||||
|
With this program, you can store and retrieve passwords between VMs
|
||||||
|
without having to grant any of the VMs any special policy privileges
|
||||||
|
other than access to the Qubes services implemented here.
|
||||||
|
|
||||||
## Using the software
|
## Using the software
|
||||||
|
|
||||||
These instructions assume you have installed the software. See the
|
These instructions assume you have installed the software. See the
|
||||||
*Installing the software* heading below for more information.
|
*Installing the software* heading below for more information.
|
||||||
|
|
||||||
|
Step 1: decide which VM you'll use to manage passwords, and which
|
||||||
|
VM you'll use to store passwords in.
|
||||||
|
|
||||||
|
In the password manager VM, create the file `/rw/config/pass-split-domain`
|
||||||
|
and add the name of the password store VM as the first and only
|
||||||
|
line of the file.
|
||||||
|
|
||||||
|
Now, from the password manager VM, run the command:
|
||||||
|
|
||||||
|
```
|
||||||
|
qvm-pass init
|
||||||
|
```
|
||||||
|
|
||||||
|
This step will create the necessary GPG keys and password store database
|
||||||
|
in the password store VM. You'll receive a Qubes policy prompt asking
|
||||||
|
you whether to allow your password manager VM to access `ruddo.PassManage`
|
||||||
|
— it is safe to say yes. You will then receive a password prompt from
|
||||||
|
GPG, confirming the creation of the key and the password that, in the
|
||||||
|
future, will be used to encrypt and access the password store.
|
||||||
|
|
||||||
|
Note: don't forget to back your password store VM up regularly!
|
||||||
|
|
||||||
|
At this point, you are ready to `list`, `insert` and run other operations
|
||||||
|
in your password store VM. `list` and `get` operations will use the
|
||||||
|
service `ruddo.PassRead`, while management operations will use the
|
||||||
|
service `ruddo.PassManage`, which allows you to set different policies
|
||||||
|
for different VMs based on what you want these VMs to be able to do with
|
||||||
|
the password store VM.
|
||||||
|
|
||||||
Run `qvm-pass -?` on a terminal to get usage information.
|
Run `qvm-pass -?` on a terminal to get usage information.
|
||||||
|
|
||||||
## Installing the software
|
## Installing the software
|
||||||
|
Loading…
x
Reference in New Issue
Block a user