Skip to content

age backend stores fail to encrypt using ssh keys #2870

Closed Answered by pmiam
pmiam asked this question in Q&A
Discussion options

You must be logged in to vote

to configure a password store to use ssh public keys is very unintuitive in my opinion.

first, run gopass setup to make a password protected age keypair.
gopass setup --crypto age

Then, new substores can be initialized using this root keypair.
gopass init --crypto age --store mystore

Then, any ssh public keys may be added to a given store
gopass recipients add --store mystore "ssh-ed25519 <KeyFromSome.ssh/key.pub>"

Finally, the root age key can be removed from any store it initialized
gopass recipients remove --store mystore "age1restOfAgePubKeyFrom.age-recipients"

The root key is needed to initialize new stores. It is also needed to successfully remove itself as a recipient, so it is bes…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by pmiam
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
1 participant