YAPET - Yet Another Password Encryption Tool 0.3a

Rafael Ostertag

$Id: README.sgml.in 2365 2009-06-11 15:09:36Z rafi $


Table of Contents

Introduction
Motivation
Supported Platforms
Features
Installation
Usage
Design
A Word of Caution
License
Additional permission under GNU GPL version 3 section 7

Introduction

YAPET is a curses based password encryption tool using the Blowfish encryption algorithm to store password records encrypted on disk. Its primary aim is to provide a safe way to store passwords in a file on disk while having a small footprint, and compiling and running under today's most popular Unixes, such as SunSolaris™, FreeBSD®, and Linux.

If you are looking for a fully fledged password encryption tool having a graphical user interface, I recommend you start with revelation (http://oss.codepoet.no/revelation). YAPET is text based and less feature rich in comparison to revelation.

Motivation

Using several different Unixes, I wanted to have a single application running on all Unixes for storing my passwords in a secure manner. While revelation is running fine under FreeBSD® and Linux, it's a pain to get it run under SunSolaris™ 10 (as you can see, the only tool I tried was revelation). It has many dependencies because it uses GNOME and PyGNOME. I didn't want to go thru the hassle of installing PyGNOME under SunSolaris™, and decided to roll my own.

Supported Platforms

YAPET successful builds and runs on following platforms:

  • FreeBSD®
  • SunSolaris™ x86
  • Linux
  • Cygwin

If you want to use YAPET under Cygwin, you may want to read the README.Cygwin file.

Features

YAPET features

Installation

YAPET uses a configure script for configuring the build process. Refer to the INSTALL file in the source tarball yapet-0.3a.tar.gz.

Usage

YAPET is kept simple. You should not find it difficult to use. The user interface has some quirks, though.

See the manual page yapet(1) after installing YAPET for a minimal usage guide.

Design

Refer to the DESIGN file which comes along with the source tarball, in order to get an idea of the design of YAPET.

A Word of Caution

Although I took several precautions to avoid having any passwords stored clear text in memory, I was able to snoop up the master password in core files. This means for you, the user of YAPET, that it is possible, though not likely, for a malicious user to get hold of one or more passwords while YAPET is running. But remember, the passwords stored in the files created by YAPET are encrypted and not stored clear text. This is the best possible way of keeping them stored on a disk. The best overall method for keeping them, is to memorize them and not writing them down in any form.

License

YAPET -- Yet Another Password Encryption Tool

Copyright (C) 2008, 2009 Rafael Ostertag

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.

Additional permission under GNU GPL version 3 section 7

If you modify this program, or any covered work, by linking or combining it with the OpenSSL project's OpenSSL library (or a modified version of that library), containing parts covered by the terms of the OpenSSL or SSLeay licenses, Rafael Ostertag grants you additional permission to convey the resulting work. Corresponding Source for a non-source form of such a combination shall include the source code for the parts of OpenSSL used as well as that of the covered work.