Hi Simon

One of the problems is that you might have saved www.domain.tld or sub.domain.tld in your password-store. They wouldn't match the cfbleed domain list, as they are only domain.tld.

Another thought I had was just to limit the password-store entries to domain.tld but then special cases like domain.co.uk wouldn't be missed.

For that reason I iterate every entry in the cfbleed list over the entries found in the password-store.

Stephan

On 25.02.2017 14:37, Simon Lackerbauer wrote:
This seems unnecessarily complex. I just cobbled together something real
quick, which works well for my usecase with filenames being domain
names, mostly at the password-store root, some in subdirectories:

#!/bin/bash

CLOUDFLARE_FILE=~/sorted_unique_cf.txt
PASS_STORE=~/dev/password-store/

find ${PASS_STORE} -not -path '*/\.*' -type f -follow -print | while
read f; do
    base_filename=${f##*/}
    base_filename_without_gpg=${base_filename%.*}
    grep -Fx "${base_filename_without_gpg}" ${CLOUDFLARE_FILE}
done

Does the job in about 4 seconds for my ~200 passwords. And apparently
uber.com and patreon.com are affected.

Cheers,
Simon

On 02/24/2017 01:13 PM, [email protected] wrote:
Hi there

Just learnt today about the cloudflare fiasco. Good that I use pass and
have seperate passwords for things.

Also, usually I store stuff in Web\domain.tld when I need to make an
account at domain.tld.

So, I wrote a small bash script that allows to check the Cloudflare
domain list with your pass entries to see, if there are services that
you use that could be compromised.

The current cloudflare domain list can be found here:

https://github.com/pirate/sites-using-cloudflare

I'm not sure how accurate that is but it has over 4 million domains.

Since the script uses bash and bash isn't so slow, it takes quite a
while to parse everything (still parsing on my system).

Basically what the script does is build an array of your pass entries -
omitting the .gpg and the path.

Then it reads out the first 1000 entries in the cloudflare list and
iterates them over each pass entry. If there's a match, it should write
to a seperate text file.

All you have to do is download the attached script, set the path to your
password-store and the cloudflare domain list and let it run. As said,
it will take quite a long time.

Feel free to improve the script ;)

Stephan


_______________________________________________
Password-Store mailing list
[email protected]
https://lists.zx2c4.com/mailman/listinfo/password-store


_______________________________________________
Password-Store mailing list
[email protected]
https://lists.zx2c4.com/mailman/listinfo/password-store

Reply via email to