The secure enclave doesn't allow import or export of private keys. For any new computer, you should just create a new set of keys. If you're using a smart card, you might be able to export your private key from the vendor's software.
Secretive relies on the SSH_AUTH_SOCK
environment variable being respected. The git
and ssh
command line tools natively respect this, but third party apps may require some configuration to work. A non-exhaustive list of setup steps is provided in the App Config FAQ.
Please run ssh -Tv [email protected]
in your terminal and paste the output in a new GitHub issue with a description of your issue.
Try running the "Setup Secretive" process by clicking on "Help", then "Setup Secretive." If that doesn't work, follow the process above.
- Make sure you have enabled "Use your Apple Watch to unlock apps and your Mac" in System Preferences --> Security & Privacy:
- Ensure that unlocking your Mac with Apple Watch is working (lock and unlock at least once)
- Now you should get prompted on the watch when your key is accessed. Double click the side button to approve:
Beginning with Secretive 2.2, every secret has an automatically generated public key file representation on disk, and the path to it is listed under "Public Key Path" in Secretive. You can specify that you want to use that key in your ~/.ssh/config
. This ServerFault answer has more details on setting that up.
The Mac's Secure Enclave only supports 256-bit EC keys, so inherently Secretive cannot support generating RSA keys.
Yes, you can! Once you've set up Secretive, just add ForwardAgent yes
to the hosts you want to forward to in your SSH config file. Afterwards, any use of one of your SSH keys on the remote host must be authenticated through Secretive.
You shouldn't, for a piece of software like this. Secretive, by design, has an auditable build process. Each build has a fully auditable build log, showing the source it was built from and a SHA of the build product. You can check the SHA of the zip you download against the SHA output in the build log (which is linked in the About window).
Awesome! Just bear in mind that because an app only has access to the keychain items that it created, if you have secrets that you created with the prebuilt version of Secretive, you'll be unable to access them using your own custom build (since you'll have changed the bundled ID).
Secretive checks in with GitHub's releases API to check if there's a new version of Secretive available. You can audit the source code for this feature here.
Drag Secretive.app to the trash and remove ~/Library/Containers/com.maxgoedjen.Secretive.SecretAgent
. SecretAgent
may continue running until you quit it or reboot.
Please contact [email protected] with a subject containing "SECRETIVE SECURITY" immediately with details, and I'll address the issue and credit you ASAP.
Please file a GitHub issue for it. I will not provide email support with the exception of the critical security issues mentioned above.
Sweet! Please check out the contributing guidelines and go from there.