Provided by: gokey_0.1.0-1build2_amd64 bug

NAME

       gokey - A simple vaultless password manager in Go

SYNOPSIS

       gokey [OPTIONS]

DESCRIPTION

       gokey  is a password manager, which does not require a password vault.  Instead of storing
       your passwords in a vault it derives your password on the fly from  your  master  password
       and  supplied  realm  string  (for  example,  resource  URL).  This way you do not have to
       manage, backup or sync your password vault (or trust its management to a third  party)  as
       your passwords are available immediately anywhere.

OPTIONS

       -o output_path
              by default gokey outputs generated data to stdout

       -P /path/to/password
              path to master password file which will be used to generate other passwords/keys or
              to encrypt seed file (see Modes of operation below, if no master password or master
              password file is provided, gokey will ask for it interactively)

       -p master_password
              master  password  which will be used to generate other passwords/keys or to encrypt
              seed file (see Modes of operation below, if no master password or  master  password
              file is provided, gokey will ask for it interactively)

       -r password/key_realm
              any  string  which  identifies  requested  password/key,  most  likely key usage or
              resource URL

       -s path_to_seed_file
              needed, if you want to use seed file instead  of  master  password  as  an  entropy
              source  (see  Modes  of  operation  below);  can  be generated with -t seed flag as
              described below

       -skip number_of_bytes
              number of bytes to skip when reading seed file

       -u     UNSAFE, allow generating keys without using a seed file  (see  Modes  of  operation
              below)

       -t password/key_type
              requested password/key output type.  Supported password/key types:

              • pass - default, generates a password

              • seed - generates a seed file, which can be used with -s option later

              • raw - generates 32 random bytes (can be used as a symmetric key)

              • ec256 - generates ECC P-256 private key

              • ec521 - generates ECC P-521 private key

              • rsa2048 - generates 2048-bit RSA private key

              • rsa4096 - generates 4096-bit RSA private key

              • x25519 - generates x25519 (also known as curve25519) ECC private key

              • ed25519 - generates ed25519 ECC private key

MODES OF OPERATION

       gokey  can  generate  passwords  and  cryptographic  private  keys  (ECC  and RSA keys are
       currently supported).  However, without any additional  options  specified  it  uses  your
       master  password  as  a  single source of entropy for generated data.  For passwords it is
       acceptable most of the time, but keys usually have much higher entropy requirements.

       For cases, where higher entropy is required for generated passwords/keys, gokey can use  a
       seed file (a blob with random data) instead of the master password as a source of entropy.

   Simple mode (without a seed file)
       In  simple  mode  passwords  are  derived directly from your master password and the realm
       string.  That is each unique combination of a master password  and  a  realm  string  will
       produce a unique password.

       For  example,  if  your  master  password  is super-secret-master-password and you want to
       generate a password for example.com, you would invoke gokey like

              gokey -p super-secret-master-password -r example.com

       If you need a password for a different resource, example2.com, you would change  the  real
       string

              gokey -p super-secret-master-password -r example2.com

       This  way  you  need  to  remember  only  your master password and you can always recreate
       passwords for your services/resources.

       NOTE: In this mode generated passwords are as strong as your master password, so  do  have
       your  master  password  strong  enough.  You can also derive private keys from your master
       password, but keep in mind, that these keys will have low entropy.   That  is  why  it  is
       considered  unsafe, so gokey does not allow it by default.  If you’re really know what you
       are doing, you can override this default by supplying -u flag.

   Using a seed file
       If you plan to generate not only passwords, but also private keys or you want to have your
       passwords/keys  with  higher  entropy,  you  can  use  a  seed  file instead of the master
       password.  You still need to supply a master password, when invoking gokey, but it will be
       used  only  to  protect the seed file itself; all generated passwords/keys will be derived
       from the data in the seed file.  gokey uses seed files  protected  (encrypted)  with  your
       master  password,  so  it  is  reasonably safe to store/backup seed files to a third party
       location, such as Google Drive or Dropbox.

       To generate an encrypted seed file, use

              gokey -p super-secret-master-password -t seed -o seedfile

       This will create a seed file seedfile  with  256  bytes  of  random  data.   The  data  is
       encrypted using AES-256-GCM mode and super-secret-master-password as a key.

       Then, to generate EC-256 private key for example.com, use

              gokey -p super-secret-master-password -s seedfile -r example.com -t ec256

AUTHOR

       Ignat Korchagin <ignat@cloudflare.com>