Password management done right for the Unix command line and the shell.
- About
- Install
- Usage
- Encryption and Security
- Databases
- Listing and Searching
- Misc
- Export
- Configuration
- License
- Feedback
Varuh
is a command line password manager that allows you to keep your passwords and other sensitive data using the power of the shell and Unix. It uses sqlite
databases to store the information and encrypts it with symmetric encryption ciphers like AES-256 and XChaCha20-Poly1305 .
The name Varuh means guardian or protector in the Slovene language.
Varuh is inspired by ylva but it is full re-implementation - with some major changes in the key derivation functions and ciphers. It is written in Go
and has been tested with Go versions 1.16 and 1.17 on Debian Linux (Antix). It should work on other versions of Linux and *BSD as well.
If you are on a Debian or Debian derived system, you can directly download and install the latest version. Check out the releases page and use dpkg
to install the binary.
$ sudo dpkg -i varuh-${VERSION}_amd64.deb
The binary will be installed in /usr/bin
folder.
You need the Go compiler to build the code. (This can be usually installed on *nix machines by the native package managers like apt-get).
Install make
by using your native package manager. Something like,
$ sudo apt install make -y
should work.
Then,
$ make
Building varuh
go: downloading github.com/akamensky/argparse v1.3.1
go: downloading golang.org/x/crypto v0.0.0-20210921155107-089bfa567519
go: downloading github.com/atotto/clipboard v0.1.4
go: downloading github.com/kirsle/configdir v0.0.0-20170128060238-e45d2f54772f
go: downloading github.com/pythonhacker/argparse v1.3.2
go: downloading gorm.io/driver/sqlite v1.2.3
...
$ sudo make install
Installing varuh...done
The binary will be installed in /usr/local/bin
folder.
$ varuh -h
usage: varuh [-h|--help] [-I|--init "<value>"] [-d|--decrypt "<value>"]
[-C|--clone "<value>"] [-R|--remove "<value>"] [-U|--use-db
"<value>"] [-E|--edit "<value>"] [-l|--list-entry "<value>"]
[-x|--export "<value>"] [-m|--migrate "<value>"] [-f|--find
"<value>" [-f|--find "<value>" ...]] [-e|--encrypt] [-A|--add]
[-p|--path] [-a|--list-all] [-g|--genpass] [-s|--show] [-c|--copy]
[-y|--assume-yes] [-v|--version]
Password manager for the command line for Unix like operating
systems
Options:
-h --help Print help information
-I --init <path> Initialize a new database
-d --decrypt <path> Decrypt password database
-C --clone <id> Clone an entry with <id>
-R --remove <id> Remove an entry with <id> or <id-range>
-U --use-db <path> Set <path> as active database
-E --edit <id> Edit entry by <id>
-l --list-entry <id> List entry by <id>
-x --export <filename> Export all entries to <filename>
-m --migrate <path> Migrate a database to latest schema
-f --find <t1> <t2> ... Search entries with terms
-e --encrypt Encrypt the current database
-A --add Add a new entry
-p --path Show current database path
-a --list-all List all entries in current database
-g --genpass Generate a strong password (length: 12 - 16)
-s --show Show passwords when listing entries
-c --copy Copy password to clipboard
-y --assume-yes Assume yes to actions requiring confirmation
-v --version Show version information and exit
AUTHORS
Copyright (C) 2022 Anand B Pillai <abpillai@gmail.com>
Varuh gives the option of two symmetric ciphers - AES (default) and XChacha20-Poly1305.
AES is a block cipher supported with 256-bit key size for encryption and is the current standard for symmetric encryption ciphers.
XChacha20-Poly1305 is a stream cipher with a longer nonce (192 bits) which makes the cipher more resistant to timing attacks than AES-GCM. It also supports 256-bit key size.
The key derivation uses Argon2 with 32MB memory and 4 threads with a random cryptographic salt of 128 bit size for both ciphers.
Databases are created and decrypted with owner rw
mode (0600). This makes sure the databases are read/write - able only by the owner.
When the auto_encrypt
and encrypt_on
flags are turned on, the database is always encrypted after an operation so the passwords remain in the clear in memory as well as in disk for a very short time. This increases the security of the data.
For maximum security, the default settings auto_encrypt
and encrypt_on
to true and visible_passwords
to false is suggested.
Varuh
works with password databases. Each password database is a sqlite3 file. You can create any number of databases but at any given time there is only one active database which is in decrypted mode. When auto_encrypt
is turned on (default), the program takes care of automatically encrypting and decrypting databases.
$ varuh -I mypasswds
Created new database - mypasswds
Updating active db path - /home/anand/mypasswds
$ ls -lt mypasswds
-rw------- 1 anand anand 8192 Nov 9 23:06 mypasswds
The password database is created and is active now. You can start adding entries to it.
$ varuh -A
Title: My Website Login
URL: mywebsite.name
Username: mememe
Password (enter to generate new):
Generating password ...done
Tags (separated by space): testing test website
Notes: Website uses Nginx auth
Do you want to add custom fields [y/N]:
Created new entry with id: 1
You can now list the entry with one of the list options.
$ varuh -l 1
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 1
Title: My Website Login
User: mememe
URL: http://mywebsite.name
Password: ****************
Tags: testing test website
Notes: Website uses Nginx auth
Modified: 2021-21-09 23:12:35
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
From version 0.3 onwards, custom fields are supported.
$ varuh -A
Title: Github token
URL: https://github.com/mydev/myproject
Username: mydev
Password (enter to generate new): ghp_ipQrStuVwxYz1a2b3cdEF10ghI689kLaMnOp
Tags (separated by space): token github
Notes: Never Expires
Do you want to add custom fields [y/N]: y
Field Name: Domain
Value for Domain: github.com
Field Name: Type
Value for Type: Auth Token
Field Name:
Created new entry with id: 6
$ varuh -l 6
ID: 6
Title: Github token
User: mydev
URL: https://github.com/mydev/myproject
Password: ghp_ipQrStuVwxYz1a2b3cdEF10ghI689kLaMnOp
Tags: token github
Notes: Never Expires
Domain: github.com
Type: Auth Token
Modified: 2021-21-13 00:07:18
For more on listing see the Listing and Searching section below.
$ varuh -E 1
Current Title: My Website Login
New Title: My Blog Login
Current URL: http://mywebsite.name
New URL: myblog.name
Current Username: mememe
New Username: meblog
Current Password: lTzC2z9kRppnYsYl
New Password ([y/Y] to generate new, enter will keep old one):
Current Tags: testing test website
New Tags:
Current Notes: Website uses Nginx auth
New Notes: Website uses Apache
Do you want to add custom fields [y/N]:
Updated entry.
$ varuh -l 1 -s
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 1
Title: My Blog Login
User: meblog
URL: http://myblog.name
Password: myblog123
Tags: testing test website
Notes: Website uses Apache
Modified: 2021-21-09 23:15:29
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
When you edit an entry with custom fields, you get the option to change the name of the fields or delete the fields entirely.
$ varuh -E 6
Current Title: Github token
New Title:
Current URL: https://github.com/mydev/myproject
New URL:
Current Username: mydev
New Username:
Current Password: ghp_ipQrStuVwxYz1a2b3cdEF10ghI689kLaMnOp
New Password ([y/Y] to generate new, enter will keep old one):
Current Tags: token github
New Tags:
Current Notes: Never Expires
New Notes:
Editing/deleting custom fields
Field Name: Domain
New Field Name (Enter to keep, "x" to delete): x
Deleting field: Domain
Field Name: Type
New Field Name (Enter to keep, "x" to delete): Token Type
Field Value: Auth Token
New Field Value (Enter to keep):
Do you want to add custom fields [y/N]:
Created 1 custom entries for entry: 21.
Updated entry.
$ varuh -l 6 -s
ID: 6
Title: Github token
User: mydev
URL: https://github.com/mydev/myproject
Password: ghp_ipQrStuVwxYz1a2b3cdEF10ghI689kLaMnOp
Tags: token github
Notes: Never Expires
Token Type: Auth Token
Modified: 2021-21-13 00:16:41
(-s turns on visible passwords)
To clone (copy) an entry,
$ $ varuh -C 1
Cloned to new entry, id: 3
$ varuh -R 1
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Title: My Website Login
User: mememe
URL: https://mywebsite.name
Modified: 2021-21-09 23:12:35
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Please confirm removal [Y/n]:
Entry with id 1 was removed from the database
It is an error if the id does not exist.
$ varuh -R 4
No entry with id 4 was found
You can remove a range of entry ids from id1-id2 using the following command.
$ varuh -R id1-id2
Example:
$ varuh -R 1-4
This will remove entries from 1 to 4 inclusive, asking for confirmation from the user every time.
If you are very sure, you can avoid the confirmation prompt by passing the -y
flag which will remove the entry without confirmation.
$ varuh -R 2 -y
...
...
...
Entry with id 2 was removed from the database
Once a database is active, creating another one automatically encrypts the current one and makes the new one the active database. The automatic encryption happens only if the configuration flag auto_encrypt
is turned on (See section Configuration below).
$ varuh -I mysecrets
Encrytping current database - /home/anand/mypasswds
Password:
Password again:
Encryption complete.
Created new database - mysecrets
Updating active db path - /home/anand/mysecrets
The previous database is now encrypted with the configured block cipher using the password. Please make sure you remember the password.
If you want to switch back to a previous database, you can use the -U
option. The same process is repeated with the current database getting encrypted and the older one getting decrypted.
$ varuh -U mypasswds
Encrypting current active database - /home/anand/mysecrets
Password:
Password again:
Encryption complete.
Database /home/anand/mypasswds is encrypted, decrypting it
Password:
Decryption complete.
Switched active database successfully.
(New in version 0.4)
When new features are added - sometimes new fields would be required to be added in the database schema. To make sure your old databases work with the new features in such cases, the -m/--migrate
option can be used to migrate your existing databases.
$ ./varuh -m /home/anand/mypasswds
Password:
Decryption complete.
Migrating tables ...
Encryption complete.
Migration successful.
For migration you need to provide the database path - even for the active database. Once migrated, you can continue to use your database as before.
NOTE: It is suggested to make a backup copy of your current active database before migration.
You can manually encrypt the current database using the -e
option.
$ varuh -e
Password:
Password again:
Encryption complete.
Note that once you encrypt the active database, you cannot use the listings any more unless it is decrypted.
$ varuh -l 2
No decrypted active database found.
Manually decrypt the database using -d
option.
$ varuh -d mypasswds
Password:
Decryption complete.
Now the database is active again and you can see the listings.
$ varuh -l 3
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 2
Title: My Blog Login
User: myblog.name
URL: http://meblog
Password: *********
Tags: test testing website
Notes: Website uses Apache
Modified: 2021-21-09 23:21:32
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
If the config param encrypt_on
is set to true
along with auto_encrypt
(default), the program will keep encrypting the database after each action, whether it is an edit/listing action. In this mode, the decryption password is saved in memory and re-used for encryption to avoid too many password queries.
$ varuh -f my -s
Password:
Decryption complete.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 2
Title: MY LOCAL BANK
User: banklogin
URL: https://my.localbank.com
Password: bankpass123
Tags: bank banking finance
Notes:
Modified: 2021-21-18 12:44:10
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Encryption complete.
In this mode, your data is provided maximum safety as the database remains decrypted only for a short while on the disk while the data is being read and once done is encrypted back again.
To list an entry using its id,
$ varuh -l 8
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 8
Title: Google account
User: anandpillai@alumni.iitm.ac.in
URL:
Password: ***********
Notes:
Modified: 2021-21-25 15:02:50
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
An entry can be searched on its title, username, URL or notes. Search is case-insensitive.
$ varuh -f google
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 8
Title: Google account
User: anandpillai@alumni.iitm.ac.in
URL:
Password: **********
Notes:
Modified: 2021-21-25 15:02:50
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 9
Title: Google account
User: xyz@gmail.com
URL:
Password: ********
Notes:
Modified: 2021-21-25 15:05:36
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 10
Title: Google account
User: somethingaboutme@gmail.com
URL:
Password: ***********
Notes:
Modified: 2021-21-25 15:09:51
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
The -f
option supports multiple terms, so you can specify this more than one time to narrow a search down to a specific entry.
$ varuh -f google -f anand
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 8
Title: Google account
User: anandpillai@alumni.iitm.ac.in
URL:
Password: **********
Notes:
Modified: 2021-21-25 15:02:50
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
$ varuh -f google -f priya
Entry for "google priya" not found
To list all entries, use the option -a
.
$ varuh -a
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 1
Title: My Bank #1
User: myusername1
URL: https://mysuperbank1.com
Password: ***********
Notes:
Modified: 2021-21-15 15:40:29
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 2
Title: My Digital Locker #1
User: mylockerusername
URL: https://mysuperlocker1.com
Password: **********
Notes:
Modified: 2021-21-18 12:44:10
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
ID: 3
Title: My Bank Login #2
User: mybankname2
URL: https://myaveragebank.com
Password: **********
Notes:
Modified: 2021-21-19 14:16:33
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
...
By default the listing is in ascending ID order. This can be changed in the configuration (see below).
To turn on visible passwords, modify the configuration setting (see below) or use the -s
flag.
To copy a password to clipboard, use the -c
or --copy
flag. This works only if the result for a listing is single. For example this will work when listing an entry by id or when a search results in a single hit. It will not work when listing all entries or when a search results in multiple hits.
This is useful to copy the password to a password input field in the browser for example.
$ varuh -p
/home/anand/mypasswds
Varuh
allows to export password databases to the following formats.
csv
markdown
html
pdf
To export use the -x
option. The type of file is automatically figured out from the filename extension.
$ varuh -x passwds.csv
!WARNING: Passwords are stored in plain-text!
Exported 14 records to passwds.csv .
Exported to passwds.csv.
$ varuh -x passwds.html
Exported to passwds.html.
PDF export is supported if pandoc
is installed along with the required pdflatex
packages. The following command (on Debian
and derived systems) should install the required dependencies.
$ sudo apt-get install pandoc texlive-latex-base texlive-fonts-recommended texlive-fonts-extra texlive-latex-extra texlive-xetex lmodern -y
Then,
$ varuh -x passwds.pdf
pdftk not found, PDF won't be secure!
File passwds.pdf created without password.
Exported to passwds.pdf.
PDF files are exported in landscape mode with 150 dpi and 600 columns. To avoid the data not fitting into one page the fields Notes
and URL
are not exported.
If pdftk
is installed, the PDF files will be encrypted with an (optional) password.
$ sudo apt-get install pdftk -y
$ varuh -x passwds.pdf
PDF Encryption Password: ******
File passwds.pdf created without password.
Added password to passwds.pdf.
Exported to passwds.pdf.
The following miscellaneous actions are supported.
Generate a strong password of length ranging from 12 - 16.
A strong
password is defined as a cryptographically secure string contaning at least one upper-case letter, one punctuation character and one number.
$ varuh -g
7%zv/uzIgpqexJ
By passing the `-c` option, the password is also copied to the clipboard.
$ varuh -g -c
y6UpD$~uBI#8
Password copied to clipboard
Varuh
uses the standard Free Desktop XDG Base Directory Spec for storing its configuration in a JSON file. This usually translates to a folder name .config/varuh in your home directory on *nix systems.
The config file is named config.json. It looks as follows.
`{
"active_db": "/home/anand/mypasswds",
"cipher": "aes",
"auto_encrypt": true,
"visible_passwords": false,
"encrypt_on": true,
"path": "/home/anand/.config/varuh/config.json",
"list_order": "id,asc",
"delimiter": ">",
"color": "default",
"bgcolor": "bgblack"
}
`
You can modify the following variables.
-
auto_encrypt
- Set this to true to enable automatic encryption/decryption when switching databases. Otherwise you have to do this manually. The default istrue
. -
cipher
- The block cipher to use. This isaes
by default. To switch toxchacha20-poly1305
set this toxchacha
,chacha
orxchachapoly
. -
visible_passwords
- Set this to true to always show passwords in clear text in listings. Otherwise passwords are masked using asterisks. This can be overridden with the-s
flag. -
encrypt_on
- Set this to true for the program to always encrypt the database after every action. This makes sure that the database is never sitting in the unencrypted form on the disk and increases the security. -
list_order
- Ordering when using the-a
option to view all listings. Supported fields are,id
- Uses theID
field.timestamp
- Uses theModified
timestamp field. Use this to show latest entries first.title
- Uses theTitle
field.username
- Uses theUser
field.
Always specify this configuration as
<field>,<order>
. Supported<order>
values areasc
anddesc
. -
delimiter
- This modifies the delimiter string when printing a listing. Only one character is allowed. -
color
- The foreground color of the text when printing listings. -
bgcolor
- The background color of the text when printing listings.
Visit this gist to see the supported color options. All color values must be in lower-case.
The fields active_db
and path
are for internal use. Suggest not to modify them.
Varuh
is licensed under the GNU GPL V3 license. See the LICENSE file for details.
Please send your valuable feedback and suggestions to my email available in the program's usage listing.