[pass] Key rotation

commentsabout at riseup.net commentsabout at riseup.net
Mon Dec 14 01:22:41 CET 2015


On 2015-12-06 23:34, Lucas Hoffmann wrote:
> The man page says you should use "pass init [-p subfolder] newid".  Or
> do you need some info that is not in the man page?

On 2015-12-07 12:22, Martijn van Dijk wrote:
> I just did this, you can run pass init <key ID 1> <key ID 2> and it 
> will
> re-encrypt all the stored passwords with both key 1 and 2. You can
> probably use this to remove the old key too.

My bad, I should have RTFM more carefully (I only greped "rotation"). 
That's exactly what I was looking for.

Thank you.

On 2015-12-06 23:37, Emil Lundberg wrote:
> I'd like to provide a friendly reminder that if you do that, make sure 
> to
> also (securely) delete all copies of your password store encrypted with 
> the
> old key(s) as they can still be decrypted with the old key(s). This
> includes old commits if you use git to version your repository, as well 
> as
> any backups you may have.
> I'm not saying rotating keys is a bad idea, just that this is something 
> you
> need to keep in mind if you do.

Of course.

On 2015-12-07 08:32, Mike Charlton wrote:
> On 7 December 2015 at 08:37, Emil Lundberg <lundberg.emil at gmail.com> 
> wrote:
>> I'm not saying rotating keys is a bad idea, just that this is 
>> something
>> you need to keep in mind if you do.
> I'm not sure  why it would be considered a good idea.  Unless I'm 
> missing
> something the reason for rotating your password is to ensure that if
> someone has gotten access to it somehow, they have limited time to make 
> use
> of it.   Since your old key is still active, that argument doesn't 
> apply.
> It just makes key management more difficult.  Unless you export 
> everything
> out and re-encrypt it, I would say that rotating keys *is* a bad idea.

Because at some point, you might want/need to change key: because you 
believe it could have been compromised (and therefore want to re-encrypt 
your password-store and get rid of the version encrypted with the 
potentially compromised key asap) ; because you want to use stronger 
crypto (generate a new – longer – key, switch to ECC,...), … There are 
tens of reasons I can think of that would require key rotation.

More information about the Password-Store mailing list