Home

Awesome

blueflower

logo

blueflower is a command-line tool that looks for secrets such as private keys or passwords in a file structure. Interesting files are detected using heuristics on their names and on their content.

Unlike some forensics tools, blueflower does not search in RAM, and does not attempt to identify cryptographic keys or algorithms in binaries.

DISCLAIMER: This program is under development. It may not work as expected and it may destroy your computer. Use at your own risk.

Features

Usage

blueflower is written for Python 2.7. It will not work on Python 3.x.

Execution

From the project's top directory, you can directly run

python blueflower.py directory [hashes]

where

Results are written to a log file blueflower-YYYYMMDDhhmmss in CSV format.

(Run make clean if you wish to remove previous log files as well as .pyc's.)

WARNINGS:

Installation

To install to the global packages directory:

sudo make install

(omit sudo on Windows)

To install locally (to site.USER_BASE):

make local

(Run make cleanall if you wish to clean up the project's directory.)

blueflower can then be called from any location, assuming that the binaries are located in a directory included in your PATH.

Python-less execution on Windows

To build a package executable on Windows machines that don't have Python installed, do the following (on a Windows machine with Python installed):

  1. install py2exe
  2. in blueflower's setup.py, add import py2exe, remove the line
    version=blueflower.__version__,

and add the line

    console=['blueflower/__main__.py'],
  1. run python setup.py py2exe

This will create an executable and associated files in the dist/ folder.

Make sure that the external modules are installed as unzipped eggs rather than as .egg files (easy_install option --always-unzip).

Hashes file

Let's say you have a list of strings that you want to search for without revealing them. These could be names, passwords, secret keys, etc.

blueflower implements this feature, by taking as optional argument a list of hashes (-H hashesfile). Obviously this comes with a performance penalty: hashing all strings matching the regular expression given.

Creation

First, put your secret strings in a text file with one item per line, for example

secret1
secret2
secret3

Then, run

python makehashes.py yourfile

which will prompt you for

This will create a file yourfile.hashes in the same directory as yourfile, to give as an argument to blueflower.

Format

The first line of .hashes files contains the regular expression.

The second line contains 2 lowercase hex strings separated by a comma (no space). These are generated by makehashes.py, and are respectively

The verifier serves to ensure that the password entered is the correct one, by checking that hashing the salt using the password entered yields a value identical to the verifier.

The subsequent lines include the SipHash-2-2 hashes of each of the secret strings, in the same order as received, using the verified key.

For example, the first 5 lines of a .hashes file can be

\b[a-z]{2,20}\b
694d63f4630c6617,d478449c1a95f8c0
06f12ba4c3b57a9f
91f5ed23a2cc21ac
381cd35a5d203fea

Security

Key derivation

A 128-bit key is derived from the password using SipHash-1000-20000 (the SipHash PRF with 1000 compression rounds and 20000 finalization rounds). This should be slow enough to mitigate bruteforce attacks, and the use of a salt makes precomputation useless.

SipHash-1000-20000 was chosen rather than a dedicated password hashing scheme (bcrypt/scrypt/PBKDF2) for simplicity, to minimize dependencies, and because the GPU-friendliness of SipHash can be compensated by really slow hashing.

The hashing speed is mostly independent of the password's length, since the 20000-iteration bottleneck is the finalization.

Verifier and salt

The presence of the verifier string allows to efficiently test the correctness of a key, and thus to bruteforce keys at a high rate by computing many SipHash-2-2 in parallel. However keys are 128-bit, and thus practically unbreakable. Again, the use of a salt makes precomputation useless.

The use of a same salt for both key derivation and verifier generation might be surprising, but it does not reduce security since different hash functions are used, and the unpredictability property is not affected.

Regular expression

The choice of the regular expression leaks information on the secrets strings searched for, so choose it carefully: the more general, the less leak, but the slower too (more strings will be hashed).

Log file

The log file only contains the hash corresponding to the secret string detected, not the string matched. The log file thus does not directly reveal the secrets searched for. However,

Dependencies

Python modules:

Intellectual property

blueflower is copyright (c) 2014 Jean-Philippe Aumasson, and under GPLv3.

The siphash.py module is copyright (c) 2013 Philipp Jovanovic, and under MIT license.

The drawing in the image blueflower.jpg is copyright (c) 2014 Melina Aumasson, and under CC BY-NC-ND 3.0.