Hiya People!

I have, for some time, had a specific problem in mind. I cannot, for the life of me, think of a better group to tell me my idea is crap.

In any case, I have a personal knowledge base I host facing the internet on a VPS. It is perfect for me, accessible, based on dokuwiki so its really easy to backup entire installation, the works. It is setup as a private wiki, so login is mandatory for viewing, editing, etc.

What I am looking for is mechanism for encrypting the data on the webserver when the user is not logged in. Under this scheme, the content of the server would be encrypted, only to be decrypted by the authorised password and encrypted again upon logout (or timeout).

Does this make sense? are there solutions like this out there?

I will attempt writing a plugin for dokuwiki, just wanted to make sure there is something out there that solves this problem in general.

Thank you!

    • py2gb@alien.topOPB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Cheers! I actually use this for some encryption here and there. My thought was more along the lines of the entire content. Server side.

      • mistersinicide@alien.topB
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        I think this plugin is probably the best you’re gonna get. It encrypts and decrypts on client side. So the data that is transmitted and stored in dokuwiki is already encrypted before it even hits the server, so data on server side at all times is encrypted. So even if an attacker gets access to the VPS, the data there is encrypted and they have no way of knowing what passphrase was used for the encryption as it not stored/configured on server side.

      • timothyclaypole@alien.topB
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        Just to add some clarification. Client side encryption basically means that all of the content on the server is always encrypted (or at least it is once it’s been saved on a client using client side encryption).

        The whole point is that the server is entirely unable to decrypt the data - there’s no possibility of some cached credentials being used to decrypt the data when you aren’t logged in, there’s no risk of accidental decryption keys being saved in log files. All the decryption takes place on the client and any bad actors would need to compromise your local PC to get access to your data.

        Done right this is the best solution for what you are looking for.

        • py2gb@alien.topOPB
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          In case anyone was wondering. I implemented a small php function. It uses aes 256 with a sha256 key “derivation” to encrypt things.

          I choose the key when encrypting, and force encryption upon logout.

          Cheers!

  • Nintenuendo_@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    This to me sounds like something that NextCloud is built for. Instead of building something piece by piece with github repos it might just be easier to switch your service platform to something that already has features like that built in.

    • py2gb@alien.topOPB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      I have resisted nextcloud. It was always slow, and cumbersome for me. I’ll have to check it out again.

      • sskg@alien.topB
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        It’s not exactly a Formula 1 car these days, but it IS faster than it used to be.

  • upofadown@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    If the attacker can attack your password hashes at full speed (they get access to the disk) then you would need a fairly hefty password or a random passphrase with a fair number of words in it. That fact can make the sort of protection you seem to be hoping for impractical in many cases.

    • py2gb@alien.topOPB
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      Not sure I follow. What I am proposing is a way of encrypting the content of the website. Decrypted only while in use, this way, if someone gets access to the server (bug, leaked password, etc) the content is still encrypted.

      • upofadown@alien.topB
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        I am making a distinction between a rate limited login password (which would be secure with something like “Karma27!”) and a password that protects encrypted disk data (which would need to be something like “Swipe Stapling Mortally Eloquence Obliged”). It sounds like you are planing to just use the login password for encrypted disk data encryption, which in general won’t work as the sort of thing that people use in that case can be trivially cracked.

        You can do some password stretching, but that only gets you a factor of thousands improvement.

  • matrix2113@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    You could always shove a firewall to lock all incoming ports and add CF Zero Trust to setup SSO (through G-Workspace/Office/Okta/2fa etc). Zero Trust should prevent anyone who isn’t you logging in (unless people have your login)

  • YTsshfd8H5rb@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Just encrypt database tables. It would be the easiest way as for me. But I still see no reason for doing anything that weird