This repository contains the Node.js, HTML, JavaScript, and supporting Serverless definition to upload secrets securely to DynamoDB and deliver a one-time URL back to the user.
Ephemera Demo
All secrets submitted here are deleted after 24hrs, and for obvious reasons security reasons do not use this as an hosted secret transfer solution!
Either use invoke-psake
or:
npm install serverless -g
npm install serverless-s3-sync --save
serverless deploy
IMPORTANT: You will need to tweak config.yml
to make bucket names etc. unique.
Ephemera is a one-time secret transfer tool intended to help you in the transition from legacy tools which do not allow secure secret communication (e.g. via password reset URLs or key fingerprints).
It is intended to be simple enough to be audited by someone with a basic understanding of JavaScript and AWS to validate that it is a non-malicious method for password transfer that you can setup in your own AWS account.
It is not intended to be a replacement for proper user-centric secret management, but merely a transitional phase to help eradicate secrets attached to plaintext emails.
This project is currently functional but needs work to add unit tests etc.
Ephemera uses five components
- AWS S3 for website hosting
- AWS Lambda for GUID creation and secret management
- AWS API Gateway as a front-end for Lambda allowing the JavaScript from the S3 website to add/retrieve secrets
- AWS DynamoDB for secret storage
- AWS KMS for secret encryption
The user is presented with a website that gives them the option to upload a text secret.
When uploading a text secret, the user submits the secret via a text box, the contents of which are submitted to the API Gateway addTextSecret
method. This method generates a GUID and saves the secret in the private S3 bucket as with that GUID as its key. The method then returns the GUID combined with the specified websiteURL for the address of the secret return page which the user can then give to the person they wish to transmit the secret to.
When a user clicks on a one-time URL, the JavaScript on the page recognises that the URL contains a GUID and then calls the API Gateway getSecret
method submitting that GUID for retrieval. The return of this method includes the secret which is displayed for the user.
Please feel free to submit pull requests of any type, whether they're bugfixes, test improvements, new features, anything!
Just make sure that if it necessitates a new AWS resource you represent it in the Terraform templates and that it does not require per hour services (e.g. EC2 or ECS).
Author:: Sam Martin ([email protected])