A securer and composable tool for doing and validating backups of Bitwarden.
Uses named pipes (UNIX-like OSes) or as a last resort filesystem notification (Windows) to securely handle Bitwarded unencrypted JSON backup from the Bitwarden Web Vault via your webbrowser or via the Bitwarden Desktop application. Also validates the backup before passing it to your encryption pipeline via a JSON schema of our own creation.
$ bitwarden-backup --path ~/Downloads/bitwarden_export.json | \
gpg -eac --passphrase-fd 3 -o bitwarden_export.json.asc \
3< <(pass bitwarden/backup) && \
scp bitwarden_export.json.asc backup-server.example.com:/backup && \
curl -sSf https://some-service/my-uuid/completed
then save the unencrypted JSON backup (.json) of your Vault into the file
~/Downloads/bitwarden_export.json
.
$ bitwarden-backup.exe --path $HOME\Downloads\ | \
gpg -eac --passphrase-fd 3 -o bitwarden_export.json.asc \
3< <(pass bitwarden/backup) && \
scp bitwarden_export.json.asc backup-server.example.com:/backup && \
curl -sSf https://some-service/my-uuid/completed
then save the unencrypted JSON backup (.json) of your Vault into the folder
$HOME\Downloads\
. We'll only act on files that starts with bitwarden_export
which is what Bitwarden by default names it's files.
$ (sleep 1 && bw --raw export > ~/Downloads/bitwarden_export.json) & \
bitwarden-backup --path ~/Downloads/bitwarden_export.json | \
gpg -eac --passphrase-fd 3 -o bitwarden_export.json.asc \
3< <(pass bitwarden/backup) && \
scp bitwarden_export.json.asc backup-server.example.com:/backup && \
curl -sSf https://some-service/my-uuid/completed
$ bitwarden-backup --path ~/Downloads/bitwarden_export.json | \
openssl enc -aes-256-ctr -pbkdf2 -pass fd:3 -out bitwarden_export.json.aes256 \
3< <(pass bitwarden/backup) && \
scp bitwarden_export.json.aes256 backup-server.example.com:/backup && \
curl -sSf https://some-service/my-uuid/completed
Nothing is secure.
But we can at least try our best:
- Use named pipe so the unencrypted passwords never hit disk and only touch memory (only on UNIX-like).
- If we need to hit disk overwrite the file (yeah, we know it probably won't help with SSD/NVMEs) (only on Windows)
- Overwrite memory used after we're done with it
- Validating the backup before passing it along to the encryption pipeline.
- Use a safe(r) programming language (Rust Evangelism Strikeforce assemble!)
- We know gpg-agent stores the passwords in memory for a while but that's not our problem ; P