Complete RedFlag codebase with two major security audit implementations.
== A-1: Ed25519 Key Rotation Support ==
Server:
- SignCommand sets SignedAt timestamp and KeyID on every signature
- signing_keys database table (migration 020) for multi-key rotation
- InitializePrimaryKey registers active key at startup
- /api/v1/public-keys endpoint for rotation-aware agents
- SigningKeyQueries for key lifecycle management
Agent:
- Key-ID-aware verification via CheckKeyRotation
- FetchAndCacheAllActiveKeys for rotation pre-caching
- Cache metadata with TTL and staleness fallback
- SecurityLogger events for key rotation and command signing
== A-2: Replay Attack Fixes (F-1 through F-7) ==
F-5 CRITICAL - RetryCommand now signs via signAndCreateCommand
F-1 HIGH - v3 format: "{agent_id}:{cmd_id}:{type}:{hash}:{ts}"
F-7 HIGH - Migration 026: expires_at column with partial index
F-6 HIGH - GetPendingCommands/GetStuckCommands filter by expires_at
F-2 HIGH - Agent-side executedIDs dedup map with cleanup
F-4 HIGH - commandMaxAge reduced from 24h to 4h
F-3 CRITICAL - Old-format commands rejected after 48h via CreatedAt
Verification fixes: migration idempotency (ETHOS #4), log format
compliance (ETHOS #1), stale comments updated.
All 24 tests passing. Docker --no-cache build verified.
See docs/ for full audit reports and deviation log (DEV-001 to DEV-019).
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
71 lines
2.1 KiB
Go
71 lines
2.1 KiB
Go
package main
|
|
|
|
import (
|
|
"crypto/ed25519"
|
|
"encoding/base64"
|
|
"encoding/hex"
|
|
"flag"
|
|
"fmt"
|
|
"os"
|
|
)
|
|
|
|
func main() {
|
|
publicB64 := flag.Bool("public-b64", false, "Extract and output public key in base64")
|
|
publicHex := flag.Bool("public-hex", false, "Extract and output public key in hex")
|
|
help := flag.Bool("help", false, "Show help message")
|
|
|
|
flag.Parse()
|
|
|
|
if *help {
|
|
fmt.Println("RedFlag Ed25519 Key Tool")
|
|
fmt.Println("Usage:")
|
|
fmt.Println(" go run ./cmd/tools/keygen -public-b64 Extract public key in base64")
|
|
fmt.Println(" go run ./cmd/tools/keygen -public-hex Extract public key in hex")
|
|
fmt.Println("")
|
|
fmt.Println("Requires REDFLAG_SIGNING_PRIVATE_KEY environment variable (64-byte hex)")
|
|
os.Exit(0)
|
|
}
|
|
|
|
// Read private key from environment
|
|
privateKeyHex := os.Getenv("REDFLAG_SIGNING_PRIVATE_KEY")
|
|
if privateKeyHex == "" {
|
|
fmt.Fprintln(os.Stderr, "Error: REDFLAG_SIGNING_PRIVATE_KEY environment variable not set")
|
|
os.Exit(1)
|
|
}
|
|
|
|
// Decode hex private key
|
|
privateKeyBytes, err := hex.DecodeString(privateKeyHex)
|
|
if err != nil {
|
|
fmt.Fprintf(os.Stderr, "Error: Invalid private key hex format: %v\n", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
if len(privateKeyBytes) != ed25519.PrivateKeySize {
|
|
fmt.Fprintf(os.Stderr, "Error: Invalid private key size: expected %d bytes, got %d\n",
|
|
ed25519.PrivateKeySize, len(privateKeyBytes))
|
|
os.Exit(1)
|
|
}
|
|
|
|
// Extract public key from private key
|
|
privateKey := ed25519.PrivateKey(privateKeyBytes)
|
|
publicKey := privateKey.Public().(ed25519.PublicKey)
|
|
|
|
// Output in requested format
|
|
if *publicB64 {
|
|
fmt.Println(base64.StdEncoding.EncodeToString(publicKey))
|
|
} else if *publicHex {
|
|
fmt.Println(hex.EncodeToString(publicKey))
|
|
} else {
|
|
// Default: show both formats
|
|
fmt.Println("Public Key (hex):")
|
|
fmt.Println(hex.EncodeToString(publicKey))
|
|
fmt.Println("")
|
|
fmt.Println("Public Key (base64):")
|
|
fmt.Println(base64.StdEncoding.EncodeToString(publicKey))
|
|
fmt.Println("")
|
|
fmt.Println("For embedding in agent binary, use:")
|
|
fmt.Printf("go build -ldflags \"-X main.ServerPublicKeyHex=%s\" -o redflag-agent cmd/agent/main.go\n",
|
|
hex.EncodeToString(publicKey))
|
|
}
|
|
}
|