Any project that wants to meet PCI compliance has to ensure that the data is encrypted whilst in flight and at rest. Amongst many other other requirements all passwords in configuration files have to be encrypted
This Gem helps achieve compliance by supporting encryption of data in a simple and consistent way
Symmetric Encryption uses OpenSSL to encrypt and decrypt data, and can therefore expose all the encryption algorithms supported by OpenSSL.
In version 3 of SymmetricEncryption, the following changes have been made that may have backward compatibility issues:
-
SymmetricEncryption.decrypt no longer rotates through all the decryption keys when previous ciphers fail to decrypt the encrypted string. In a very small, yet significant number of cases it was possible to decrypt data using the incorrect key. Clearly the data returned was garbage, but it still returned a string of data instead of throwing an exception. See SymmetricEncryption.cipher_selector= to supply your own custom logic to determine the correct cipher to use when the encrypted string does not have a header and multiple ciphers are defined.
-
#encode and #decode have been moved from low-level ciphers and into SymmetricEncryption. Does not affect existing calls to the commonly used SymmetricEncryption.encrypt and SymmetricEncryption.decrypt methods.
-
Configuration file format prior to V1 is no longer supported
-
New configuration option has been added to support setting encryption keys from environment variables
-
Cipher.parse_magic_header! now returns a Struct instead of an Array
-
New config options :encrypted_key and :encrypted_iv to support setting the encryption key in environment variables
Many solutions that encrypt data require the encryption keys to be stored in the applications source code or leave it up to the developer to secure the keys on the application servers. symmetric-encryption takes care of securing the symmetric encryption keys.
The following steps are used to secure the symmetric encryption keys using symmetric-encryption:
- Symmetric Encryption keys are stored in files that are not part of the application, its source code, or even stored in its source control system. These files can be created, managed and further secured by System Administrators. This prevents developers having or needing to have access to the symmetric encryption keys
- The Operating System security features limit access to the Symmetric Encryption key files to System Administrators and the userid under which the Rails application runs.
- The files in which the Symmetric Encryption keys are stored are further encrypted using RSA 2048 bit encryption
In order for anyone to decrypt the data being encrypted in the database, they would need access to ALL of the following:
- A copy of the files containing the Symmetric Encryption Keys which are secured by the Operating System
- The application source code containing the RSA private key to decrypt the above files
- The userid and password for the database to copy the encrypted data itself, or an unsecured copy or export of the database contents
A major feature of symmetric encryption is that it makes the encryption and decryption automatically available when the Rails application is started. This includes all rake tasks and the Rails console. In this way data can be encrypted or decrypted as part of any rake task.
From a security perspective it is important then to properly secure the system so that no hacker can switch to and run as the rails user and thereby gain access to the encryption and decryption capabilities
It is not necessary to encrypt the IV (initialization vector), and it can be placed directly in the configuration file. The encryption key must be kept secure and must never be placed in the configuration file or other Rails source file in production. The IV should be generated using the rails generator described below to ensure it is a truly random key from the key space.
By default symmetric encryption uses the same initialization vector (IV) and encryption key to encrypt data using the SymmetricEncryption.encrypt call. This technique is required in cases where the encrypted data is used as a key to lookup for example a Social Security Number, since for the same input data it must always return the same encrypted result. The drawback is that this technique is not considered secure when encypting large amounts of data.
For non-key fields, such as storing encrypted raw responses, use the :random_iv => true option where possible so that a randomly generated IV is used and included in every encrypted string.
The Symmetric Encryption streaming interface SymmetricEncryption::Writer avoids this problem by using a random IV and key in every file/stream by default. The random IV and key are stored in the header of the output stream so that it is available when reading back the encrypted file/stream.
The ActiveRecord attr_encrypted method supports the :random_iv => true option. Similarly for Mongoid the :random_iv => true option can be added.
Note that encrypting the same input string with the same key and :random_iv => true option will result in different encrypted output every time it is encrypted.
- Encryption of passwords in configuration files
- Encryption of ActiveRecord model attributes by prefixing attributes / column names with encrypted_
- Encryption of Mongoid model fields by adding :encrypted option to field definitions
- Externalization of symmetric encryption keys so that they are not in the source code, or the source code control system
- Validator for ActiveRecord Models to ensure fields contain encrypted data
- Stream based encryption and decryption so that large files can be read or written with encryption, along with a random key and IV for every file
- Stream based encryption and decryption also supports compression and decompression on the fly
- When :compress => true option is specified Symmetric Encryption will transparently compress the data prior to decryption. When decrypting compressed data Symmetric Encryption will transparently decompress the data after decryption based on the header stored in the encrypted data
- Uses built-in support in Ruby for OpenSSL and Zlib for high performance and maximum portability without introducing any additional dependencies
- Drop in replacement for attr_encrypted. Just remove the attr_encrypted gem
- For maximum security supports fully random keys and initialization vectors extracted from the entire encryption key space
-
Add the encryption header to all encrypted strings. See the always_add_header option in the configuration file.
-
Set :random_iv => true for all ActiveRecord attributes and Mongoid fields which are not used in indexes and will not be used as part of a query.
SymmetricEncryption.encrypt "Sensitive data"
SymmetricEncryption.decrypt "JqLJOi6dNjWI9kX9lSL1XQ==\n"
class User < ActiveRecord::Base
# Requires table users to have a column called encrypted_bank_account_number
attr_encrypted :bank_account_number
# Requires table users to have a column called encrypted_social_security_number
attr_encrypted :social_security_number
# Since string and long_string are not used in the where clause of any SQL
# queries it is better to ensure that the encrypted value is always different
# by encrypting every value with a random Initialization Vector.
attr_encrypted :string, :random_iv => true
# Long encrypted strings can also be compressed prior to encryption to save
# disk space
attr_encrypted :long_string, :random_iv => true, :compress => true
validates :encrypted_bank_account_number, :symmetric_encryption => true
validates :encrypted_social_security_number, :symmetric_encryption => true
end
# Create a new user instance assigning a bank account number
user = User.new
user.bank_account_number = '12345'
# Saves the bank_account_number in the column encrypted_bank_account_number in
# encrypted form
user.save!
# Short example using create
User.create(:bank_account_number => '12345')
To encrypt a field in a Mongoid document, just add ":encrypted => true" at the end of the field specifier. The field name must currently begin with "encrypted_"
# User model in Mongoid
class User
include Mongoid::Document
field :name, :type => String
field :encrypted_bank_account_number, :type => String, :encrypted => true
field :encrypted_social_security_number, :type => String, :encrypted => true
field :encrypted_life_history, :type => String, :encrypted => {:compress => true, :random_iv => true}
end
# Create a new user document
User.create(:bank_account_number => '12345')
# When finding a document, always use the encrypted form of the field name
user = User.where(:encrypted_bank_account_number => SymmetricEncryption.encrypt('12345')).first
# Fields can be accessed using their unencrypted names
puts user.bank_account_number
class MyModel < ActiveRecord::Base
validates :encrypted_ssn, :symmetric_encryption => true
end
m = MyModel.new
m.valid?
# => false
m.encrypted_ssn = SymmetricEncryption.encrypt('123456789')
m.valid?
# => true
Passwords can be encrypted in any YAML configuration file.
For example config/database.yml
---
production:
adapter: mysql
host: db1w
database: myapp_production
username: admin
password: <%= SymmetricEncryption.try_decrypt "JqLJOi6dNjWI9kX9lSL1XQ==\n" %>
Note: Use SymmetricEncryption.try_decrypt method which will return nil if it fails to decrypt the value, which is essential when the encryption keys differ between environments
Note: In order for the above technique to work in other YAML configuration files the YAML file must be processed using ERB prior to passing to YAML. For example
config_file = Rails.root.join('config', 'redis.yml')
raise "redis config not found. Create a config file at: config/redis.yml" unless config_file.file?
cfg = YAML.load(ERB.new(File.new(config_file).read).result)[Rails.env]
raise("Environment #{Rails.env} not defined in redis.yml") unless cfg
Example: Read and decrypt a line at a time from a file
SymmetricEncryption::Reader.open('encrypted_file') do |file|
file.each_line do |line|
puts line
end
end
Example: Encrypt and write data to a file
SymmetricEncryption::Writer.open('encrypted_file') do |file|
file.write "Hello World\n"
file.write "Keep this secret"
end
Example: Compress, Encrypt and write data to a file
SymmetricEncryption::Writer.open('encrypted_compressed.zip', :compress => true) do |file|
file.write "Hello World\n"
file.write "Compress this\n"
file.write "Keep this safe and secure\n"
end
Before generating keys we can use SymmetricEncryption in a standalone test environment:
# Use test encryption keys
SymmetricEncryption.cipher = SymmetricEncryption::Cipher.new(
:key => '1234567890ABCDEF1234567890ABCDEF',
:iv => '1234567890ABCDEF',
:cipher_name => 'aes-128-cbc'
)
encrypted = SymmetricEncryption.encrypt('hello world')
puts SymmetricEncryption.decrypt(encrypted)
For PCI compliance developers should not be the ones creating or encrypting passwords. The following rake tasks can be used by system administrators to generate and encrypt passwords for databases, or external web calls. It is safe to pass the encrypted password for say MySQL to the developers who can then put it in the config files which are kept in source control.
Generate a random password and display its encrypted form:
rake symmetric_encryption:random_password
Encrypt a known value, such as a password:
rake symmetric_encryption:encrypt
Note: Passwords must be encrypted in the environment in which they will be used. Since each environment should have its own symmetric encryption keys
Encrypt a file
INFILE="Gemfile.lock" OUTFILE="Gemfile.lock.encrypted" rake symmetric_encryption:encrypt_file
Encrypt and compress a file
INFILE="Gemfile.lock" OUTFILE="Gemfile.lock.encrypted" COMPRESS=1 rake symmetric_encryption:encrypt_file
Decrypt a file encrypted and optionally compressed using symmetric encryption
INFILE="Gemfile.lock.encrypted" OUTFILE="Gemfile.lock2" rake symmetric_encryption:decrypt_file
When decrypting a compressed file it is not necessary to specify whether the file was compressed since the header embedded in the file will indicate whether it was compressed
The file header also contains a random key and iv used to encrypt the files contents. The key and iv is encrypted with the global encryption key being used by the symmetric encryption installation.
Add the following line to Gemfile
gem 'symmetric-encryption'
Install the Gem with bundler
bundle install
The configuration file contains the path to the production encryption key files. Generally in development and test the files are not created, so supply the full path to these files in production. Once the config file has been generated it can be modified as needed.
Generate the configuration file:
rails generate symmetric_encryption:config /etc/rails/keys
Note: Ignore the warning about "Symmetric Encryption config not found" since it is being generated
This configuration file should be checked into the source code control system. It does Not include the Symmetric Encryption keys. They will be generated in the next step.
Once development and testing is complete we need to generate secure encryption key files for production. It is recommended that the step below be run on only one of the production servers. The generated key files must then be copied to all the production web servers.
Note: Do not run this step more than once, otherwise new keys will be generated and any encrypted data will no longer be accessible.
Note: Do not run this step on more than one server in each environment otherwise each server will be encrypting with it's own key and the servers will not be able to decrypt data encrypted on another server. Just copy the generated files to each server
The symmetric encryption key consists of the key itself and an optional initialization vector.
To generate the keys run the following Rake task once only in each environment:
rails generate symmetric_encryption:new_keys production
Replace 'production' as necessary for each environment.
Make sure that the current user has read and write access to the folder listed in the config file option key_filename.
Note: Ignore the warning about the key files "not found or readable" since they are being generated
Once the Symmetric Encryption keys have been generated, secure them further by making the files read-only to the Rails user and not readable by any other user. Change ownership of the keys to the rails user and only give it access to read the key files:
chown rails /etc/rails/keys/*
chmod 0400 /etc/rails/keys/*
Change 'rails' above to the userid under which your Rails processes are run and update the path to the one supplied when generating the config file or look in the config file itself
When running multiple Rails servers in a particular environment copy the same key files to every server in that environment. I.e. All Rails servers in each environment must run the same encryption keys.
Note: The generate step above must only be run once in each environment
SymmetricEncryption can also be used in non-Rails environment.
Install SymmetricEncryption
gem install symmetric-encryption
Manually create a symmetric-encryption.yml configuration file based on the one supplied in examples/symmetric-encryption.yml.
At application startup, run the code below to initialize symmetric-encryption prior to attempting to encrypt or decrypt any data
require 'symmetric-encryption'
SymmetricEncryption.load!('config/symmetric-encryption.yml', 'production')
Parameters:
- Filename of the configuration file created above
- Name of the environment to load the configuration for
To manually generate the symmetric encryption keys, run the code below
require 'symmetric-encryption'
SymmetricEncryption.generate_symmetric_key_files('config/symmetric-encryption.yml', 'production')
Parameters:
- Filename of the configuration file created above
- Name of the environment to load the configuration for
According to the PCI Compliance documentation: "Cryptographic keys must be changed on an annual basis."
During the transition period of moving from one encryption key to another symmetric-encryption supports multiple Symmetric Encryption keys. If decryption with the current key fails, any previous keys will also be tried automatically.
By default the latest key is used for encrypting data. Another key can be specified for encryption so that old data can be looked in queries, etc.
Since just the Symmetric Encryption keys are being changed, we can still continue to use the same RSA Private key for gaining access to the Symmetric Encryption Keys
Create a configuration file in config/symmetric-encryption.yml per the following example:
#
# Symmetric Encryption for Ruby
#
---
# For the development and test environments the test symmetric encryption keys
# can be placed directly in the source code.
# And therefore no RSA private key is required
development: &development_defaults
key: 1234567890ABCDEF1234567890ABCDEF
iv: 1234567890ABCDEF
cipher_name: aes-128-cbc
test:
<<: *development_defaults
production:
# Since the key to encrypt and decrypt with must NOT be stored along with the
# source code, we only hold a RSA key that is used to unlock the file
# containing the actual symmetric encryption key
#
# Sample RSA Key, DO NOT use this RSA key, generate a new one using
# openssl genrsa 2048
private_rsa_key: |
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
# List Symmetric Key files in the order of current / latest first
ciphers:
-
# Filename containing Symmetric Encryption Key encrypted using the
# RSA public key derived from the private key above
key_filename: /etc/rails/.rails.key
iv_filename: /etc/rails/.rails.iv
# Encryption cipher_name
# Recommended values:
# aes-256-cbc
# 256 AES CBC Algorithm. Very strong
# Ruby 1.8.7 MRI Approximately 100,000 encryptions or decryptions per second
# JRuby 1.6.7 with Ruby 1.8.7 Approximately 22,000 encryptions or decryptions per second
# aes-128-cbc
# 128 AES CBC Algorithm. Less strong.
# Ruby 1.8.7 MRI Approximately 100,000 encryptions or decryptions per second
# JRuby 1.6.7 with Ruby 1.8.7 Approximately 22,000 encryptions or decryptions per second
cipher_name: aes-256-cbc
-
# OPTIONAL:
#
# Any previous Symmetric Encryption Keys
#
# Only used when old data still exists that requires old decryption keys
# to be used
key_filename: /etc/rails/.rails_old.key
iv_filename: /etc/rails/.rails_old.iv
cipher_name: aes-256-cbc
-
Ability to randomly generate a new initialization vector (iv) with every encryption and put the iv in the encrypted data as its header, without having to use SymmetricEncryption::Writer
-
With file encryption randomly generate a new key and initialization vector (iv) with every file encryption and put the key and iv in the encrypted data as its header which is encrypted using the global key and iv
-
Support for compression via SymmetricEncryption.encrypt, attr_encrypted and Mongoid fields
-
SymmetricEncryption.encrypt has two additional optional parameters:
random_iv [true|false]
Whether the encypted value should use a random IV every time the
field is encrypted.
It is recommended to set this to true where feasible. If the encrypted
value could be used as part of a SQL where clause, or as part
of any lookup, then it must be false.
Setting random_iv to true will result in a different encrypted output for
the same input string.
Note: Only set to true if the field will never be used as part of
the where clause in an SQL query.
Note: When random_iv is true it will add a 8 byte header, plus the bytes
to store the random IV in every returned encrypted string, prior to the
encoding if any.
Default: false
Highly Recommended where feasible: true
compress [true|false]
Whether to compress str before encryption
Should only be used for large strings since compression overhead and
the overhead of adding the 'magic' header may exceed any benefits of
compression
Note: Adds a 6 byte header prior to encoding, only if :random_iv is false
Default: false
- Code:
git clone git://github.com/ClarityServices/symmetric-encryption.git
- Home: https://github.com/ClarityServices/symmetric-encryption
- Issues: http://github.com/ClarityServices/symmetric-encryption/issues
- Gems: http://rubygems.org/gems/symmetric-encryption
This project uses Semantic Versioning.
Reid Morrison :: [email protected] :: @reidmorrison
Copyright 2012 Clarity Services, Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Although this library has assisted Clarity in meeting PCI Compliance it in no way guarantees that PCI Compliance will be met by anyone using this library for encryption purposes.