The CSL passcard contains the root passwords for all CSL systems. The passcard is maintained in a git repository hosted on GitLab. The repository is maintained by the lead Sysadmins and any questions, concerns or bug reports should be directed to them.


To use the passcard system, you must have the following:

  • Git

  • GPG

  • A GPG key

    • If you are using the official CSL passcard, the public key should be signed by a lead Sysadmin or by someone with all the lead Sysadmins in their trustnet and also stored on a public keyserver.

  • Python3

    • To use the wrapper script

Accessing the Passcard

The git repository is accessible via GitLab at To clone the repository, run the following command: git clone You can clone it from outside the TJ network, but to access the passcard repository you MUST have a GitLab account.

Using the Passcard

The passcard git repository has a wrapper script ( along with GPG encrypted passwords individually encrypted in the passwords folder. Since the passwords are individually encrypted, each password is encrypted with the keys of the people who should have access to it. For example, somebody can have access to Core0's password without having access to Waitaha's password. You can use gpg yourself and decrypt these passwords, or you can use the wrapper script which does it all for you.

For help with the wrapper script, run it without any arguments. Here are the commands you can use:

./ get antipodes will show you the decrypted password for antipodes and antipodes-ilo (to use most commands, you must have gpg installed with your private key imported).

./ dump will make a nice, two-column passcard to stdout of all the passwords you have access to.

./ addkey antipodes "Chris Reffett" will add Chris Reffett's public key to the antipodes passcard so he can then decrypt it.

./ add will give you an interface for adding a new passcard.

Changes to the passcard locally will be pushed automatically by the script to the GitLab repository.

There is also a file sysadmin_keys.txt in the repository that contains GPG keys for each of the Sysadmins, as well as the faculty sponsor. Import them at your own risk, but if you wish to import all of them, you can do that with cat sysadmin_keys.txt | grep -v '#' | grep -Po "0x[0-9A-Za-z]+" | xargs gpg --recv-keys on a Linux system.

Last updated