
Keybase for windows windows#
The vulnerability was quickly replicated on Windows by navigating to the Roaming folder of the AppData directory:Ĭ:\Users\usernamehere\AppData\Roaming\Keybase\Cache
Keybase for windows mac#
It was easily seen within mac because of the fileviewer functionality, but on windows a user has to change the file extension from its native extension to. In other words, a user could send a photo to another user via a private conversation, and click on the “delete” or “explode” button and the photo could still be recovered via the “Cache” directory due to the insufficient cache clearing issue/lack of encryption of the content. In addition, the directory even included images that other users had sent us. The issue was similar in the sense that images were also being stored in this directory, unencrypted, however – the amount of images stored were far more in quantity than in the “uploadtemps” directory. ~/Library/Application Support/Keybase/Cache Sakura Samurai began to investigate further and that’s when a similar issue was discovered within the “Cache” directory of the Keybase Client for macOS: Users/usernamehere/Library/Caches/Keybase/uploadtemps Additional Escalation Robert investigated the issue further while Cottle & Henry quickly spun up an instance of Keybase on macOS and were able to determine that the issue also existed on these platforms, but utilizing a slightly different filesystem path: John noticed that inside of these folders, photos that had been previously pasted into conversations remained, unencrypted.Īt this point, John decided to call in Aubrey Cottle, Jackson Henry, and Robert Willis to investigate the issue further. The directory contained randomized folders: Within several minutes, John noticed a directory named “uploadtemps”Ĭ:\Users\yourusername\AppData\Local\Keybase\uploadtemps Socketdir:C%3a\Users\Jerry\AppData\Roaming\gnupgĭirmngr-socket:C%3a\Users\Jerry\AppData\Roaming\gnupg\S.dirmngrĪgent-ssh-socket:C%3a\Users\Jerry\AppData\Roaming\gnupg\S.gpg-agent.sshĪgent-extra-socket:C%3a\Users\Jerry\AppData\Roaming\gnupg\S.gpg-agent.extraĪgent-browser-socket:C%3a\Users\Jerry\AppData\Roaming\gnupg\S.gpg-agent.browserĪgent-socket:C%3a\Users\Jerry\AppData\Roaming\gnupg\S.During security research, John Jackson stumbled upon the Keybase Client directories and decided to take a look considering Keybase operates a Bug Bounty Program. Localedir:C%3a\Program Files (x86)\GnuPG\share\locale Libdir:C%3a\Program Files (x86)\GnuPG\lib\gnupgĭatadir:C%3a\Program Files (x86)\GnuPG\share\gnupg Libexecdir:C%3a\Program Files (x86)\GnuPG\bin Sysconfdir:C%3a\ProgramData\GNU\etc\gnupgīindir:C%3a\Program Files (x86)\GnuPG\bin You can find the location of nf with this command: $ gpgconf.exe -list-dirs I tried to set the number to 999999999, but it didn't work at all To expand the expiry on the passphrase, add these line to nf: default-cache-ttl 34560000 To make gpg-agent auto-running when I logged in, I add a task in Task Scheduler: You can use gpgconf -launch gpg-agent to make gpg-agent running in background on Windows.
Keybase for windows how to#
I see the man page talks about how to start the gpg-agent in a Bash session, but I'm not sure how to translate that to Windows and have it work across cmd.exe and PowerShell. I've this gpg-connect-agent thing, but I don't know what to do with it. Gpg-agent: gpg-agent running and available The gpg-agent says it's running PS> gpg-agent However, I can't figure out how to get gpg-agent to start caching my passphrase. I installed it via Chocolatey, so I have the complete default installation. I'm on Windows, so I'm looking at Gpg4win (recommend by GitHub and others).

You need a passphrase to unlock the secret key forĢ048-bit RSA key, ID AD9184C0, created (main key ID 293FEB8B)Īs I understand it, I need something like gpg-agent installed. Now, I'm trying to solve the problem of typing the key passphrase on every single commit. I setup a GPG key with keybase.io and have it synced on my local machine and on my Git server.
