The Perl Toolchain Summit needs more sponsors. If your company depends on Perl, please support this very important event.

NAME

Crypt::NamedKeys - A Crypt::CBC wrapper with key rotation support

SYNOPSYS

    use Crypt::NamedKeys;
    my $crypt = Crypt::NamedKeys->new(keyname => 'href');
    my $encrypted = $crypt->encrypt_data(data => $href);
    my $restored_href = $crypt->decrypt_data(
        data => $encrypted->{data},
        mac  => $encrypted->{mac},
    );

DESCRIPTION

This module provides functions to serialize data for transfer via non-protected channels with encryption and data integrity protection. The module tracks key number used to encrypt information so that keys can be rotated without making data unreadable.

CONFIGURATION AND KEY ROTATION

The keys are stored in the keyfile, configurable as below. Keys are numbered starting at 1. Numbers must never be reused. Typically key rotation will be done in several steps, each with its own rollout. These steps MUST be done as separate releases because otherwise keys may not be available to decrypt data, and so things may not work.

keyfile location

The keyfile can be set using the keyfile($path) function. There is no default.

keyfile format

The format of the keyfile is YAML, following a basic structure of

 keyname:
    [keyhashdef]

so for example:

 cryptedfeed:
    default_keynum: 9
    none: queith7eeTh0teejaichoodobooX9ceechee9Sai9gauChiengaeraew3aDiehei
    1: aePh8ahBaNg1bee6ohj3er5cuzeepoophai1oogohpoixothah4AuYiongu4ahta
    2: oht1eep8uxoo1eeshaSaemee9aem5chahqueu0Aedaa7eeXae9aeghe5umoNah6a
    3: chigh4veifoofe0Vohphee4ohkaef9giz2iaje2ahF4ohboSh6ifaiNgohwohchi
    4: Ahphahmisaingo5Ietheangeegi5ia1uuF9taerooShaitoh1Eophig3ohziejet
    5: oe5wi2equee6FeiZohjah2peas6Ahquohniefeimai0beip2waxeizoo1OhthohN
    6: eigaezee3CeuC8phae4giph6Miqu6piy3Eideipahticesheij7se9eecai9fiez
    7: DuuGhohViGh0Sheihahr6ce4Phuin7ahpaiSa5jaiphie3eiz8oa3dohrohghuow
    8: ahfoniemah4boemeN8seJ7hohhualeetei7aegohhai5ohwahlohnah2Ee2Ewal1
    9: Ceixei4shelohxee1ohdoochuliebael1kae8eit0Geeth1so9fohZi0cohs8go4
    10: boreiDe0shueNgie7shai7ooc1yaeveiKeihuox0xahp1hai8phe7aephiel2oob

In general we assume key spefications to use numeric keys within the named key hash. This makes key rotation a lot easier and prevents reusing key numbers.

Key names may not contain = or -.

All keys listed can be used for decryption (with the special 'none' key used if no key number is specified in the cyphertex), but by default only the default keynumber (default_keynum, in this case 9) is used for encrypting.

The keynumber is specified in the resulting cyphertext so we know which key to use for decrypting the cyphertext even if we don't try to decrypt it. This allows:

Key checking

If you store cyphertext in your rdbms, you can check which keys are used before you remove decryption support for a key.

Orderly key rotation

You can add a key, and later depricate it, managing the transition (and perhaps even using logging to know when the old key is no longer needed).

Step 1: Adding a New Key

In many cases you need to be able to add and remove keys without requiring that everything gets the new keys at the same time. For example if you have multiple production systems, they are likely to get updated in series, and if you expect that everyone gets the keys at the same time, timing issues may occur.

For this reason, we recommend breaking up the encryption key rollout into a number of steps. The first one is making sure that everyone can use the new key to decrypt before anyone uses it to encrypt.

The first release is by adding a new key so that it is available for decryption.

For example, in the keyfile suppose one has:

  mykey:
    default_keynum: 1
    none: rsdfagtiaueIUPOIUYHH
    1: rsdfagtiaueIUPOIUYHH

We might add another line

    2: IRvswqerituq-HPIOHJHGdeewrwyugfrGRSe3eyy6te

Once this file is released, the key number 2 will be available globally for decryption purposes, but everything will still be encrypted using key number 1.

This means it is safe then to go onto the second step.

Step 2: Setting the new key as default

Once the new keys have been released, the next step is to change the default keynumber. Data encrypted in this way will be available even to servers waiting to be updated because the keys have previously been rolled out. To do this, simply change the default_keynum:

  mykey:
    default_keynum: 1
    1: rsdfagtiaueIUPOIUYHH
    2: IRvswqerituq-HPIOHJHGdeewrwyugfrGRSe3eyy6te

becomes:

  mykey:
    default_keynum: 2
    1: rsdfagtiaueIUPOIUYHH
    2: IRvswqerituq-HPIOHJHGdeewrwyugfrGRSe3eyy6te

Now all new data will be encrypted using keynumber 2.

Step 3: Retiring the old key

Once the old key is no longer being used, it can be retired by deleting the row.

The Special 'none' keynum

For aes keys before the key versioning was introduced, there is no keynum associated with the cyphertext, so we use this key.

CONFIGURATION PARAMETERS

$Crypt::NamedKeys::Escape_Eq;

Set to true, using local or not, if you want to encode with - instead of =

Note that on decryption both are handled.

PROPERTIES

keynum

Defaults to the default keynumber specified in the keyfile (for encryption)

keyname

The name of the key in the keyfile.

METHODS AND FUNCTIONS

Crypt::NamedKeys->keyfile($path)

Can also be called as Crypt::NamedKeys::keyfile($path)

Sets the path of the keyfile. It does not load or reload it (that is done on demand or by reload_keyfile() below

reload_keyhash

Can be called as an object method or function (i.e. Crypt::NamedKeys::reload_keyhash()

Loads or reloads the keyfile. Can be used via event handlers to reload confguration as needed

$self->encrypt_data(data => $data)

Serialize $data to JSON, encrypt it, and encode as base64. Also compute HMAC code for the encrypted data. Returns hash reference with 'data' and 'mac' elements.

Args include

data

Data structure reference to be encrypted

cypher

Cypher to use (default: Rijndael)

$self->decrypt_data(data => $data, mac => $mac)

Decrypt data encrypted using encrypt_data. First checks HMAC code for data. If data was not tampered, decrypts it and decodes from JSON. Returns data, or undef if decryption failed.

$self->encrypt_payload(data => $data)

Encrypts data using encrypt_data and returns result as a string including both cyphertext and hmac in base-64 format. This can work on arbitrary data structures, scalars, and references provided that the data can be serialized as an attribute on a JSON document.

$self->decrypt_payload(value => $value)

Accepts payload encrypted with encrypt_payload, checks HMAC and decrypts the value. Returns decripted value or undef if check or decryption has failed.

INHERITED METHODS

Moo::Object

BUILDALL, BUILDARGS, DEMOLISHALL, does, meta