Skip to content

Instantly share code, notes, and snippets.

@msmuenchen
Last active September 18, 2022 21:53
Show Gist options
  • Star 60 You must be signed in to star a gist
  • Fork 18 You must be signed in to fork a gist
  • Save msmuenchen/9318327 to your computer and use it in GitHub Desktop.
Save msmuenchen/9318327 to your computer and use it in GitHub Desktop.
KeePass v2.x (KDBX v3.x) file format
Convention: Byte array notation as it would appear in a hexeditor.
= Layout=
KDBX files, the keepass database files, are layout as follows:
1) Bytes 0-3: Primary identifier, common across all kdbx versions:
private static $sigByte1=[0x03,0xD9,0xA2,0x9A];
2) Bytes 4-7: Secondary identifier. Byte 4 can be used to identify the file version (0x67 is latest, 0x66 is the KeePass 2 pre-release format and 0x55 is KeePass 1)
private static $sigByte2=[0x67,0xFB,0x4B,0xB5];
3) Bytes 8-9: LE WORD, file version (minor)
4) Bytes 10-11: LE WORD, file version (major)
5) Dynamic header. Each header entry is [BYTE bId, LE WORD wSize, BYTE[wSize] bData].
5.1) bId=0: END entry, no more header entries after this
5.2) bId=1: COMMENT entry, unknown
5.3) bId=2: CIPHERID, bData="31c1f2e6bf714350be5805216afc5aff" => outer encryption AES256, currently no others supported
5.4) bId=3: COMPRESSIONFLAGS, LE DWORD. 0=payload not compressed, 1=payload compressed with GZip
5.5) bId=4: MASTERSEED, 32 BYTEs string. See further down for usage/purpose. Length MUST be checked.
5.6) bId=5: TRANSFORMSEED, variable length BYTE string. See further down for usage/purpose.
5.7) bId=6: TRANSFORMROUNDS, LE QWORD. See further down for usage/purpose.
5.8) bId=7: ENCRYPTIONIV, variable length BYTE string. See further down for usage/purpose.
5.9) bId=8: PROTECTEDSTREAMKEY, variable length BYTE string. See further down for usage/purpose.
5.10) bId=9: STREAMSTARTBYTES, variable length BYTE string. See further down for usage/purpose.
5.11) bId=10: INNERRANDOMSTREAMID, LE DWORD. Inner stream encryption type, 0=>none, 1=>Arc4Variant, 2=>Salsa20
6) Payload area (from end of header until file end).
6.1) BYTE[len(STREAMSTARTBYTES)] BYTE string. When payload area is successfully decrypted, this area MUST equal STREAMSTARTBYTES. Normally the length is 32 bytes.
6.2) There are at least 2 payload blocks in the file, each is laid out [LE DWORD dwBlockId, BYTE[32] sHash, LE DWORD dwBlockSize, BYTE[dwBlockSize] bData].
dwBlockSize=0 and sHash=\0\0\...\0 (32x \0) signal the final block, this is the last data in the file.
= Crypto stuff =
To decrypt the payload area (encrypted as a whole), one needs to do the following:
1) gather all the key composites and concatenate their bytes together. The obvious one is the password composite, whose bytes are gathered by taking the sha256 hash of the password (32 bytes).
2) Over the concatenated composite key bytes, make a sha256 hash. This is the "composite key".
3) Establish an AES128-ECB context, IV=16x \0, key TRANSFORMSEED.
4) Copy the "composite key" into a variable called "transformed key". Over this variable, run the pseudocode transformed_key=aes.encrypt(transformed_key) the number of times specified in TRANSFORMROUNDS.
5) Finally, set transformed_key=sha256(transformed_key).
6) Obtain the master key by running master_key=sha256(CONCAT(MASTERSEED,transformed_key)).
7) Depending on CIPHERID, set up a decryption context with key master_key and IV ENCRYPTIONIV. For the default AES encryption, use AES128-CBC with PKCS#7-style padding. This will yield raw_payload_area.
8) Using the payload area specs from above, split out the individual payload blocks. In a kdbx file there should only be one block with ID 0 be present. Checking if the (master)key is correct can be done by comparing the first X bytes of the payload area with the value of STREAMSTARTBYTES in the header, X being the length of STREAMSTARTBYTES.
9) If COMPRESSIONFLAGS = 1, run bData through gzdecode() to obtain the plain Keepass XML file; if COMPRESSIONFLAGS is 0, it is already in bData.
10) Depending on INNERRANDOMSTREAMID, set up the inner stream context. 0 will mean all passwords in the XML will be in plain text, 1 that they are encrypted with Arc4Variant (not detailed here) and 2 that they will be encrypted with Salsa20.
11) Set up a Salsa20 context using key PROTECTEDSTREAMKEY and fixed IV [0xE8,0x30,0x09,0x4B,0x97,0x20,0x5D,0x2A].
12) Sequentially(!) look in the XML for "Value" nodes with the "Protected" attribute set to "True" (a suitable xpath might be "//Value[@Protected='True']").
13) Obtain their innerText and run it through base64_decode to obtain the encrypted password/data. Then, run it through salsa20 to obtain the cleartext data.
14) Optionally, check the header for integrity by taking sha256() hash of the whole header (up to, but excluding, the payload start bytes) and compare it with the base64_encode()d hash in the XML node <HeaderHash>(...)</HeaderHash>.
= Notes =
The inner stream cipher is supposed to deliver the same pseudo-random byte sequence using key+fixed IV as seed. Because of this, strict care must be taken to not mess up the ordering of decryption.
@ddotlic
Copy link

ddotlic commented Feb 12, 2015

Thank you for this wonderful and almost completely correct gist!

A minor but important correction: in step 11, one should calculate SHA256 hash the PROTECTEDSTREAMKEY before use (as a key) or the decryption won't work.

Since I am using my own Salsa20 implementation I spent a few hours making sure it was flawless (built it 7 years ago), assuming your 'spec' was good but then had a hunch (don't want to look into the source code of KeePass) that it didn't and tried SHA hashing (which is prevalent everywhere) and it worked.

Thanks again.

@u1735067
Copy link

u1735067 commented Jun 9, 2017

"pre-release format and 0x55 is KeePass 1" : it is 0x65 :)

@tecywiz121
Copy link

In (Layout 5.3) you say that the outer encryption is AES256, but in (Crypto Stuff 7) you specify AES128. According to this, it looks like KeePass uses AES with a key size of 256 and a block size of 128.

@shioju
Copy link

shioju commented Sep 6, 2017

How did you find out about the file format? Was trying to find an official specification, but I couldn't find any.

@lgg
Copy link

lgg commented Oct 18, 2017

@shioju i think he read the source code.

Also check this: https://github.com/lgg/awesome-keepass#docs-and-articles

@Evidlo
Copy link

Evidlo commented Apr 12, 2018

I wrote a simple example in Python implementing above (AES only, no protected entries).
https://github.com/Evidlo/examples/blob/master/python/kdbx3_decrypt.py

Also, here's a reference for KDBX4, as well as another python example:
https://github.com/Evidlo/keepassxc-specs/blob/master/kdbx-binary/kdbx4.md
https://github.com/Evidlo/examples/blob/master/python/kdbx4_decrypt.py

@toby1984
Copy link

First of all, thanks for your hard work - using your info I was able to decrypt a KeePass2 file in no time! Could you please update step #10 of your document to include the fix mentioned by ddotlic (Salsa20 needs to be initialized with SHA256(PROTECTEDSTREAMKEY) as key) ? I've spent 1.5 hours looking for a bug in my code before I finally gave in and read the KeePassX CPP source code, realized my mistake and then - wanting to point out this mistake in the comments here - read the comment by ddotlic ....

@marhu98
Copy link

marhu98 commented Aug 18, 2021

I have a question, it seems in 5) after the LE WORD there always comes 3 0x0 bytes, is that correct?
For some reason, when I get to bId=7, it says the length is 0x10, but it's really not (0x18 is the correct length).
Perhaps they changed something in version 4 of .kdbx?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment