Check-in [bf46eec3a7]
Overview
Comment:Updated README to be more accurate and deal with the new storage mechanism
Downloads: Tarball | ZIP archive | SQL archive
Timelines: family | ancestors | descendants | both | trunk
Files: files | file ages | folders
SHA1: bf46eec3a77340322d4fddf5484f6b4ce01c41cf
User & Date: rkeene on 2016-03-15 19:41:08
Other Links: manifest | tags
Context
2016-03-15
19:51
Updated password saving to be less atomic but more consistently able to preserve ACLs, permissions, etc check-in: fe9b9c5e48 user: rkeene tags: trunk
19:41
Updated README to be more accurate and deal with the new storage mechanism check-in: bf46eec3a7 user: rkeene tags: trunk
19:34
Updated to use a plain-text format for password storage check-in: 8732d95e73 user: rkeene tags: trunk
Changes

Modified README.md from [14fa5b7da1] to [3cbd93776b].

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18

19
20
21
22
23
All I see are stars
===================

About
-----
The "hunter2" password manager is a simple script-oriented password 
manager.  You request that passwords be stored by a given identifier and 
then later retrieve them with that identifier.

Passwords are encrypted using your public RSA key and can be decrypted 
with your private RSA key.  Currently only keys stored on hardware 
security modules (such as smartcards, TPMs, etc) are supported.

Passwords may be shared among users of the same database and anyone who 
can decrypt the password may add additional users be able to access the 
password.

Passwords are stored in a simple SQLite3 DB.  AES-128 is used to encrypt 

the passwords and RSA is used to encrypt the AES key.

Demo
----
<script type="text/javascript" src="https://asciinema.org/a/39190.js" id="asciicast-39190" async></script>










|






|
>
|




1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
All I see are stars
===================

About
-----
The "hunter2" password manager is a simple script-oriented password 
manager.  You request that passwords be stored by a given identifier and 
then later retrieve them with that identifier.

Passwords are encrypted using your public RSA key and can be decrypted 
with your private RSA key.  Currently only keys accessed via PKCS#11
security modules (such as smartcards, TPMs, etc) are supported.

Passwords may be shared among users of the same database and anyone who 
can decrypt the password may add additional users be able to access the 
password.

Passwords are stored in a simple text-based file which can be easily
merged by your version control system.  AES-128 is used to encrypt the
passwords and RSA is used to encrypt the AES key.

Demo
----
<script type="text/javascript" src="https://asciinema.org/a/39190.js" id="asciicast-39190" async></script>