Re: Confirmation for cached passphrases useful?

2010-10-23 Thread Ingo Klöcker
On Monday 18 October 2010, Faramir wrote:
 El 17-10-2010 22:09, Doug Barton escribió:
  On 10/17/2010 5:43 PM, Faramir wrote:
  |That may be true. However, remember feeling secure is part of
  |security
  | 
  | too, so if that feature doesn't break anything, and make people
  | sleep better...
  
  Two problems with that theory. The first is that a false sense of
  security does more harm than good. The second is that there is no
  such thing as a zero-cost change to software. So any proposed
  change has to have benefits that outweigh the costs. Of course
  accurately anticipating those costs is a whole different category
  of problems. :)
 
   Right, I agree, we don't want those stones that keeps tigers away.
 But as long as people know the feature may be ignored by malware, it
 wouldn't be false sense of security, maybe it would be the solution
 against false sense of insecurity (if such thing exist).
 
   Also, I was not saying anything about costs of adding the feature,
 so my message should have said: if there is a developer willing to
 add it, and it doesn't break anything, and it can be disabled by
 user, I'm ok with it. Please note I'm not requesting that feature,
 I just said I would not oppose to it's addition.

The feature might not break anything now but it will make the software 
more complex. More complex software tends to break more easily. One of 
the main design goals of gpg-agent, pinentry, etc., was to keep the code 
of those small helper applications dealing with the secret keys and the 
passphrases as simple as possible to avoid the complexity trap.

Also, it's a popular fallacy that adding a feature generates cost only 
once. Every new feature will increase the maintenance costs and thus 
generate additional cost for the whole lifetime of the software.


Regards,
Ingo


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

El 15-10-2010 14:31, Doug Barton escribió:
 On 10/15/2010 9:23 AM, Werner Koch wrote:
 Nevertheless, the confirmation prompt for a cached passphrase is not
 entirely unfounded
...
 The other problem with the confirmation proposal is that (unless I'm
 missing something really dramatic) the intersection between plausible
 attack vectors and vulnerabilities that confirmation would actually fix
 seems so small that it does not justify even the coding/QA time to
 develop the feature, never mind the inconvenience to the user.

  I guess as long as it can be disabled by people thinking it is
useless/too annoying, it won't cause problems...

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJMu5bbAAoJEMV4f6PvczxAiOEIAI0JBQ47kWOjw6tnidtBDgQJ
FmLo/Xo9sxrKVq2JhxQPtYn1zlswZiYOZubCR070Yz9mO8Bx4CbkuwAS/XbsfFav
ciUuoB5cwh+Vkhj+U4S2KWO5NCdEhTYmrgNZ9ZR66WH6qygHHt2DkPjCxmWXMALW
OKvO52LXrjCnF+I+DtY2nfBjepYGjQatAntitzUTORz33Ggq/Q2I5UmGB8DEu1q2
ezmK9Zf8q5xMMx9Vwgt7ZN/Y9bF/VUVdGg7Y9Px4e/KbCSVTbHShlMpN8M+rthD/
iLNFnA2YK8ZBJqnbuEGvzyjx/NaJUHRryGIxZZTKJvn6Hmr9xgVcOCnUDXqkpkM=
=7+qH
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

El 15-10-2010 20:29, Jameson Rollins escribió:

 No, I was just curious why, if you were an ssh-agent user, you would be
 ok with the implementation there but not for gpg-agent.  If you're not
 an ssh-agent user then you have nothing to get defensive about.

  Lets say I buy a house, and the house has elephant proof fences. Since
it didn't made the price too expensive, I'm ok with that. And since it
doesn't bother me, I don't need to remove them. But now I buy another
house, and somebody says hey, this house lack of elephant proof fences,
will you add them?. My answer would be no, there are not elephants in
this country, so there is no need to spend money and time building
something I don't need.

  If a developer already added a feature to some software, well, there
is no need to complain. The thing is: should GnuPG developers spend time
in adding a new feature? I'm not a developer, so whatever they chose is
ok for me, as long as they don't break anything.

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJMu5pVAAoJEMV4f6PvczxA4rUH/3V9SvwiFBmdYQQFpBIkFyAp
EROf8aBPumPszHPavAR8vuize+58Vx1wrtjfEwNVYnUuAtNTAxQXrcP70x9Rrqj5
AItQyCo++3F32gLdMzO+4BKIVa5PlmOLi7eqkShCdGp7pHHWWUZLEnSDRb1LYvj4
NsgHMibDNkMNah6ntXKVvBg1omk9OeEanr1tsLv/15DfAVzEaFGhOo68Nr1+4R6A
ZvGFn2RgHlaFEfIGCwe8Dy8C1/FpWcU68UcrJwlACZtiwpqp4ip623m5Fgro3rcG
1P81FrCDTaLLSbEMxAbimu20hTGm6ZX3j2FoLip7mP4Yf8IGP43kLJlFARclhWc=
=q4c7
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Doug Barton

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On 10/17/2010 5:43 PM, Faramir wrote:
|
|That may be true. However, remember feeling secure is part of security
| too, so if that feature doesn't break anything, and make people sleep
| better...

Two problems with that theory. The first is that a false sense of
security does more harm than good. The second is that there is no such
thing as a zero-cost change to software. So any proposed change has to
have benefits that outweigh the costs. Of course accurately anticipating
those costs is a whole different category of problems. :)


Doug

- -- 


Breadth of IT experience, and|   Nothin' ever doesn't change,
depth of knowledge in the DNS.   |   but nothin' changes much.
Yours for the right price.  :)   |  -- OK Go
http://SupersetSolutions.com/
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.14 (MingW32)

iQEcBAEBCAAGBQJMu55cAAoJEFzGhvEaGryErNUH/iUNcxZJCLG93g7GuaKpZK5A
Ef68JxFHHrlVqlhCsFaAWbkCgYqmJp+z5PqxUbxE7zoJojXcVNnm0GaSfuhwKVp1
nyVOZwa60C0OH+9eCE29hYh3/Bn+IbzYnBvzg23cYBcfl0wi7JbJNdxlbvRpWsB2
CeTIOhUx9auF/Bya1qrC4HIga4zcdKRJp5qL59AdiQxBJhyUIDM3d8E+g2GPYWqO
WV8ZjuC8bOLPCoCHTz9957+HQqiHRtGF33cTvNokzO7SaK0UCCZ3UXkD0RKY69CS
WpvY08K/rKoI7bHPSa0oCQuX06mosdgFAwJtfAGxaQe7j5O9hn2/EGP+Mw9MgYE=
=S7zO
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

El 17-10-2010 22:09, Doug Barton escribió:
 On 10/17/2010 5:43 PM, Faramir wrote:
 |
 |That may be true. However, remember feeling secure is part of security
 | too, so if that feature doesn't break anything, and make people sleep
 | better...
 
 Two problems with that theory. The first is that a false sense of
 security does more harm than good. The second is that there is no such
 thing as a zero-cost change to software. So any proposed change has to
 have benefits that outweigh the costs. Of course accurately anticipating
 those costs is a whole different category of problems. :)

  Right, I agree, we don't want those stones that keeps tigers away. But
as long as people know the feature may be ignored by malware, it
wouldn't be false sense of security, maybe it would be the solution
against false sense of insecurity (if such thing exist).

  Also, I was not saying anything about costs of adding the feature, so
my message should have said: if there is a developer willing to add it,
and it doesn't break anything, and it can be disabled by user, I'm ok
with it. Please note I'm not requesting that feature, I just said I
would not oppose to it's addition.

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJMu77zAAoJEMV4f6PvczxAixsH/2eOUTAxT6NRjNkknkUPX3B9
C6smHbt7s3pQOdRGsEMwzuF6/IvcFAIs/wiO9ouKpaJed3xWjqPYL9BCOmpSfDDT
1gTfYXjE8fRAgy6z+Otj5JHSAOVHPJWGDYtYTz/JjH23R7sx6QTOXikW5Yct6McU
0gP1NWLQElp1t0SIwzldSCFFmCVX2PSU6MTD24ZTYfnWS4PwQNg8C/DHbyK+94I4
K6nr18Bi+cfHbC4sPRGuXkDAStkEW+sHn2udPCn3fNX17lQKsZbJgRUH3eEByLj2
Guwv8wD2hvM920X3Yj+5NtmVnpke+af+bKMbM6o+nHEhvNMC6QUwn5sqB/L86cY=
=YyM0
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

El 17-10-2010 23:47, Robert J. Hansen escribió:
...
  And if one day the user finds it has been disabled somehow, the user
 might become aware of some malware in the machine...
 
 By this logic every user should have a big piece of Scotch tape on the center 
 of his or her screen.  If the piece of tape is ever missing, then you know 
 someone's been tampering with your machine.

  Yes, something like that. That's why I installed something supposed to
warn me if a unknown process tries to communicate with another process.
If it works as expected, I would get a warning about trojan.exe trying
to access Agent, and I would have to chose between blocking it, allowing
it, and making a rule from my decision to prevent future warnings about
the same thing.

  I'm not requesting that feature, I don't need it, but it won't bother
me if somebody decides to implement it, as long as it can be disabled.
Also, since software is always changing, many times in annoying ways
(I'm _not_ talking about GnuPG), probably soon or latter I'll have to
get used to a confirmation screen where there was none in the previous
version.

  I think I won't participate in _this_ discussion anymore, since I
already said I'm neutral about that feature, and don't have anything to
say that might be valuable to the discussion.

  Best Regards
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCAAGBQJMu8KSAAoJEMV4f6PvczxAyxoH/RJMkGI6Z8AvO8/hdrAC1rgG
tIqlV3IIk4EamOnIEFbEV7E2K8QiY3W7kjx30i1ELe+jfStfpgG70gpuYI3ZgODw
GjaVI2eiZcjOrtkQ+ToSlyVrlf5IY196kvMgpyda+ARZQNCMcu015rhz0RIC0P/5
TZcu2z+mfwbxOr3UYSau9xzd4EI8ivjFroh+SpaysPw0JkFKtAndCmzXLOqH5eH5
VArfiqDPBjdExxzaT3iInfHrJPZCuSlfwIwNK6n252LCkruf+tdoykYEC/2CrvI7
4rQJPTmGXca+98YgRpdFXxbf7o7gGjwI/vF1+HvlS4C1o4990DyYvZ8itDKBXPM=
=mrQ+
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Werner Koch
On Wed, 13 Oct 2010 17:51, d...@fifthhorseman.net said:

 If i run the agent locally, and forward access to it to a constrained
 account, then the constrained account (which is talking to the agent)
 *does not* have the ability to simulate such X11 events.

You mean to a different X server?  For example from a nested one to the
main X server?  Then why do you want to have this yes/no prompt, the
other X server has no access to the pinentry.

I doubt that it is possible to have a restricted account running on the
same X server.

 requires, say, an ACPI event, or a special keypress (not an X11 event)
 from a designated hardware button.  in that case, malicious code with
 access to the X11 session could detect that a prompt had been made, and

If there is malicious code running on your machine with access to
resources under your control, I can only say: game over.  No external
button will help you here.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Hauke Laging
Am Freitag 15 Oktober 2010 12:28:33 schrieb Werner Koch:

 If there is malicious code running on your machine with access to
 resources under your control, I can only say: game over.  No external
 button will help you here.

That's why we try to restrict the access of malicious code, isn't it?

Following your pessimistic attitude there would hardly be any reason not to 
work as root.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Werner Koch
On Thu, 14 Oct 2010 20:03, sascha-ml-reply-to-201...@silbe.org said:

 One instance where the proposed mechanism (in conjunction with the new
 version of gpg-agent that will handle the secret keys itself) would be

Just for the records: This is no new mechanism of the agent.  It is in
use for about 8 years now.  The change is that GPG uses this mechanism
now, in the past only GPGSM and the the ssh-agent support in gpg-agent
used it.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Werner Koch
On Fri, 15 Oct 2010 12:55, mailinglis...@hauke-laging.de said:

 Following your pessimistic attitude there would hardly be any reason not to 
 work as root.

Nope.  Not working under root is important to keep the system stable and
provide access restrictions to the non-malicious users.

OTOH, it is hard enough to close all remotely exploitable bugs.  Given
the constant proliferation of local privilege escalation bugs, it seems
to me not possible for the majority of systems to keep them *all*
closed.  Look only on how many admins are proud of their system's
uptimes and check for example the list of severe Linux bugs.

If you want to protect your keys, use a smartcard or a second box acting
similar to a smartcard.

Nevertheless, the confirmation prompt for a cached passphrase is not
entirely unfounded given that we have quite some feature in gpg-agent
which are more questionable (e.g. the whole passphrase quality checking
stuff).


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Doug Barton

On 10/15/2010 9:23 AM, Werner Koch wrote:

Nevertheless, the confirmation prompt for a cached passphrase is not
entirely unfounded


I've really been biting my tongue on this thread because it seemed like 
the right people were saying the right things already, but you're making 
me nervous now Werner. :)


The right solution to the concern expressed is to keep the time for 
gpg-agent to cache the pass phrase down to a reasonable level, where 
reasonable may mean different things in different environments. I 
don't remember what the default is, but I do recall thinking when I 
first installed -agent that it seemed sufficiently short to protect new 
users from themselves; but too short for my tastes, so I fixed it. :)


The other problem with the confirmation proposal is that (unless I'm 
missing something really dramatic) the intersection between plausible 
attack vectors and vulnerabilities that confirmation would actually fix 
seems so small that it does not justify even the coding/QA time to 
develop the feature, never mind the inconvenience to the user.



hth,

Doug

--

Breadth of IT experience, and|   Nothin' ever doesn't change,
depth of knowledge in the DNS.   |   but nothin' changes much.
Yours for the right price.  :)   |  -- OK Go
http://SupersetSolutions.com/

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
On 10/15/10 1:31 PM, Doug Barton wrote:
 The other problem with the confirmation proposal is that ... the
 intersection between plausible attack vectors and vulnerabilities
 that [this proposal] would actually fix seems [very] small.

I seem to recall saying something similar to this a few days ago.  :)

I'll go one step further: so far I haven't seen anyone present a
plausible intersection.  I've seen some hypothetical intersections, but
none that I think are plausible.

This seems like a nonsolution to a nonproblem.

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
On 10/15/10 2:49 PM, Jameson Rollins wrote:
 Without use confirmation in the agent, a malicious program running under
 your account could access your secret key without you knowing it.

This can still happen with a confirmation prompt.  Confirmation cannot
protect against malware running under your account.  If the agent pops
up a dialog box, then all I have to do is intercept the dialog box and
answer 'yes.'

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
 Ok, then this protects against malicious programs that are not
 intercepting the dialog box.

Which means that six months after this feature gets implemented, the malware 
authors will write exploits that intercept the dialog box.

Arms races are inevitable, but stupid arms races should be avoided.

 Don't let the perfect be the enemy of the good.

I'm not.  This idea isn't good.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Grant Olson
On 10/15/10 5:04 PM, Jameson Rollins wrote:
 Don't let the perfect be the enemy of the good.
 

But is it good?  To me this feature seems like security theater.  It
makes you feel all warm and fuzzy and lets you sleep at night, but
doesn't provide any real protection.

Is it good to have users thinking that there's no way their box can be
compromised, because they're not getting pop-ups, when in reality they
may be completely compromised?  Do the percieved protections of this
feature come anywhere close to the actual protection provided?

-- 
Grant

I am gravely disappointed. Again you have made me unleash my dogs of war.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Jameson Rollins
On Fri, 15 Oct 2010 18:23:04 -0400, Robert J. Hansen r...@sixdemonbag.org 
wrote:
 I'm not.  This idea isn't good.

Do you use ssh-agent?  Do you think their implementation of the same
thing is not good?  If so, have you complained to them about it, or
asked why the implemented it?

jamie.


pgph0M2eECPqg.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Hauke Laging
Am Samstag 16 Oktober 2010 00:23:04 schrieb Robert J. Hansen:
  Ok, then this protects against malicious programs that are not
  intercepting the dialog box.
 
 Which means that six months after this feature gets implemented, the
  malware authors will write exploits that intercept the dialog box.
 
 Arms races are inevitable, but stupid arms races should be avoided.

This implies the strange claim that it will forever be possible to do that. As 
I already mentioned you can run X clients untrustedly today and SELinux is 
going to be extended by features for X access restriction.

But, of course, you can deny all applications that never use gpg keys access 
to both the files and the socket by means of the LSMs even today. And if an 
application gets hijacked that has to access the key files and the socket then 
an attacker can wait until the next intended operation occurs. So the user 
would not notice the abuse of his key.

The process of informing the user could be more clever than a simple gpg-
agent access, please click OK window. An obvious option is to allow the user 
to configure a program and allow or deny access based on the exit code; we saw 
proposals what such a check program could do here in the discussion. I just 
don't like the idea that access to the agent is not noticed by design.

Somebody mentioned an inconvenience for the user. I would make this 
behaviour an option (for people understanding the merits and limits) not the 
default. Thus no inconvenience for anyone.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
 Do you use ssh-agent?  Do you think their implementation of the same
 thing is not good?  If so, have you complained to them about it, or
 asked why the implemented it?

This seems to be an argument from implication of hypocrisy: as if, were I a 
user of ssh-agent, my opinion regarding gpg-agent could be safely dismissed on 
the grounds of my hypocrisy by not bringing the same issues up to the ssh-agent 
authors.

The answer to your questions are, no, I do not, I have not looked at it 
enough to have an informed opinion, and I reject out of hand all argument by 
implication of hypocrisy.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
 This implies the strange claim that it will forever be possible to do that.

It does not.  It states that at present the OS infrastructure we have makes 
implementing this a losing proposition.

As soon as the OS infrastructure changes enough to make this a winner, then we 
should revisit this decision.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Jameson Rollins
On Sat, 16 Oct 2010 01:05:11 +0200, Hauke Laging 
mailinglis...@hauke-laging.de wrote:
 I just don't like the idea that access to the agent is not noticed by
 design.

I strongly agree with this point.  Let's think about it another way:
what if the user is themselves doing something that is unintentionally
accessing the key?  They might prefer to know about it rather than have
it accessed without their knowledge.  I would say that's good enough
reason to have confirmation right there.

jamie.


pgpnVgCOCUNn9.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Jameson Rollins
On Fri, 15 Oct 2010 19:12:21 -0400, Robert J. Hansen r...@sixdemonbag.org 
wrote:
  Do you use ssh-agent?  Do you think their implementation of the same
  thing is not good?  If so, have you complained to them about it, or
  asked why the implemented it?
 
 This seems to be an argument from implication of hypocrisy: as if,
 were I a user of ssh-agent, my opinion regarding gpg-agent could be
 safely dismissed on the grounds of my hypocrisy by not bringing the
 same issues up to the ssh-agent authors.

No, I was just curious why, if you were an ssh-agent user, you would be
ok with the implementation there but not for gpg-agent.  If you're not
an ssh-agent user then you have nothing to get defensive about.

jamie.


pgpP9szUlw4zT.pgp
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
 I strongly agree with this point.  Let's think about it another way:
 what if the user is themselves doing something that is unintentionally
 accessing the key?

Then that's the user's own problem.  They're the one who decided to enable 
passphrase caching and to set a large timeout window.  They get to make their 
decisions, and it's foolish of us to try to protect them from it.

In fact, I would argue this feature would cause more problems than it claims 
to solve.  The number of people who would benefit from it is relatively small.  
The number of people who discover their automated scripts no longer work would 
be large.

No choice comes without consequences.  This feature enhancement is no exception.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Daniel Kahn Gillmor
On 10/13/2010 07:02 PM, MFPA wrote:
 The user can type their password once per session into a text file and
 paste it every time it is requested. This reduces the annoyance factor
 and does not train the user to constantly re-type the passphrase.

This strikes me as the worst suggestion on this thread so far.  Please,
do not store the passphrase to your secret key in the clear in a file on
your computer, and do not suggest that other people do so.  That's even
worse than writing it on a post-it note and taping it to your monitor.

Passphrases are your last line of defense against a compromise of your
secret key material.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread martin f krafft
also sprach MFPA expires2...@ymail.com [2010.10.14.0102 +0200]:
 The user can type their password once per session into a text file
 and paste it every time it is requested. This reduces the
 annoyance factor and does not train the user to constantly re-type
 the passphrase.

That's a great idea. I have started work on a Facebook applet to
automate this process, so that I can keep such vital information
with everything else that I care about.

Strangely appropriate, randomly selected quote below.

-- 
martin | http://madduck.net/ | http://two.sentenc.es/
 
we are trapped in the belly of this horrible machine,
 and the machine is bleeding to death.
-- godspeed you black emperor!
 
spamtraps: madduck.bo...@madduck.net


digital_signature_gpg.asc
Description: Digital signature (see http://martin-krafft.net/gpg/)
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Dan Cowsill
On 13/10/2010 4:02 PM, MFPA wrote:
 The user can type their password once per session into a text file and
 paste it every time it is requested. This reduces the annoyance factor
 and does not train the user to constantly re-type the passphrase.

I use a program called KeePass to keep track of my passwords.  It has a
linux port called KeePassX, as well.  It stores the password in an
encrypted database and when the user requests it, copies it to the
clipboard.  After 20 seconds, the clipboard is cleared.  KeePass can
also be configured to lock the workspace after a certain period of time
idle.





signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Sascha Silbe
Excerpts from Robert J. Hansen's message of Tue Oct 12 15:25:50 +0200 2010:

 These two attack modes (root and user access) cover the overwhelming
 majority of instances today, so already this hypothetical attack is an
 exotic.

That most mainstream systems are painfully easy to attack doesn't imply
we should stop trying to make systems more secure.

One instance where the proposed mechanism (in conjunction with the new
version of gpg-agent that will handle the secret keys itself) would be
both useful and secure is Sugar [1] in combination with Rainbow [2].
Depending on who you believe, there are currently some hundred thousand
to over a million systems currently running this combination (on OLPC [3]
XO-1 [4]).

Sascha

[1] https://www.sugarlabs.org/
[2] http://wiki.laptop.org/go/Rainbow
[3] http://www.laptop.org/
[4] http://wiki.laptop.org/go/XO-1
--
http://sascha.silbe.org/
http://www.infra-silbe.de/


signature.asc
Description: PGP signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Grant Olson
On 10/13/10 11:51 AM, Daniel Kahn Gillmor wrote:
 
 From a different perspective, i could run the agent itself in a
 constrained account, and replace the prompting tool with a tool that
 requires, say, an ACPI event, or a special keypress (not an X11 event)
 from a designated hardware button.  in that case, malicious code with
 access to the X11 session could detect that a prompt had been made, and
 possibly dismiss it or hide it from the user, but could not force
 acceptance of the keypress without superuser access (at which point,
 game over anyway).  To take a vulnerability from a malicious use of
 secret key material to a simpler denial of service attack strikes me as
 a move in the right direction.
 

But ultimately once you start trying to fix the problem by offloading
the checks to special hardware, you might as well just key a smart card
reader with an integrated keypad.  Then you can use a simple pin.  Not
quite as convenient as hitting Y/N, but way more convenient than a
really strong password.

-- 
Grant

I am gravely disappointed. Again you have made me unleash my dogs of war.



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Daniel Kahn Gillmor
On 10/14/2010 04:31 PM, Grant Olson wrote:
 But ultimately once you start trying to fix the problem by offloading
 the checks to special hardware, you might as well just key a smart card
 reader with an integrated keypad.  Then you can use a simple pin.  Not
 quite as convenient as hitting Y/N, but way more convenient than a
 really strong password.

Yes, that'd be nice, if that hardware is available and convenient for
the user.

But far more people have access to a laptop with system-handled ACPI key
combinations than have access to card readers with integrated keypads.

card readers with integrated keypads are also bulky, awkward to
transport and use in mobile context, and tend to be significantly slower
at performing secret-key operations than modern computers (laptop or
desktop).

card readers with integrated keypads are also additional points of
failure, and have a non-negligible financial cost over and above the
cost of the hardware on which to run GnuPG.

Back to the original point: a confirmation prompt for the agent has the
potential to be useful in many cases, particularly with the agent model
described for the upcoming gnupg 2.1, and to a lesser extent with
earlier versions of the agent protocol.  I'm not denying that there are
other approaches which might solve the same problem, but there are
tradeoffs to all of them which may not be suitable for any particular user.

I remain perplexed at the opposition this reasonable feature proposal
has received.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Thursday 14 October 2010 at 3:18:47 PM, in
mid:4cb71147.5090...@fifthhorseman.net, Daniel Kahn Gillmor wrote:


 This strikes me as the worst suggestion on this thread
 so far.  Please, do not store the passphrase to your
 secret key in the clear in a file on your computer, and
 do not suggest that other people do so.

It was a non-serious suggestion of a simple, albeit obviously
insecure, way to overcome the two issues you mentioned in your
previous posting (about re-typing the passphrase each time the secret
key gets used being annoying and potentially insecure). As Dan Cowsill
points out, there are password managers available that allow the
user to copy/paste their passphrase in much the same way but store it
in an encrypted database.


[
 That's even
 worse than writing it on a post-it note and taping it
 to your monitor.

That would depend on your threat model...


- --
Best regards

MFPAmailto:expires2...@ymail.com

Another person's secret is like another person's money:
you are not as careful with it as you are with your own
-BEGIN PGP SIGNATURE-

iQCVAwUBTLd9IKipC46tDG5pAQo5FQP8CuVxi8krMIFKMC3IaGRhaq/D4MJj/oC7
q7o0aZImA+/6pK5j77J4vo5WmPVfCK8lVUvEY8V9J0lYVjKcTtPHYiczrVdj08Ys
qaB3ZC3pvtnGNq2v8eXoSqUwU+IbR5br7Dqwk2DO3e57fE4vaaAZqraCxAc3E0AN
AepG+OFrsGg=
=r9kT
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Hauke Laging
Am Dienstag 12 Oktober 2010 04:44:41 schrieb Daniel Kahn Gillmor:

 (e.g. one process can send a simulated mouseclick to another process
 pretty easily)

I am not familiar with X details (let alone that other one OS). Does grabbing 
the mouse prevent other processes from knowing where the click occurs? You 
could use a dialog differen from just an OK button. You could display a ten 
times ten array and the user hat to click a certain number. This is similar 
fast to clicking the OK button and easy to remember (always the same number) 
but makes abuse improbable (of course, that is not the level of probability we 
usually have when attacking gpg...).

If other processes cannot read the content of the dialog window then other 
means are possible: Use a blank area with a randomly positioned mark to click 
on.

And react to failures.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Chris Knadle

On Thu, October 14, 2010 4:54 pm, Daniel Kahn Gillmor wrote:
 On 10/14/2010 04:31 PM, Grant Olson wrote:
 But ultimately once you start trying to fix the problem by offloading
 the checks to special hardware, you might as well just key a smart card
 reader with an integrated keypad.  Then you can use a simple pin.  Not
 quite as convenient as hitting Y/N, but way more convenient than a
 really strong password.

 Yes, that'd be nice, if that hardware is available and convenient for
 the user.

 But far more people have access to a laptop with system-handled ACPI key
 combinations than have access to card readers with integrated keypads.

This reminds me of the Yubikey, which is a one-button USB stick that
registers as a keyboard, and types your password when you press the
button on it.  In other words, you don't necessarily need there to be a
/physical/ keypad for a device to act like it has a keyboard.

IIRC this wasn't the particular use case meant for the Yubikey though -- I
think it was meant to be used in combination with online sites.  There
might be a similar device meant for GPG... or one could be made if it
doesn't exist yet.

Anything beats copying a password to a plaintext file, which is insane. 
Seems to beg a Spaceballs quote: 12345?  I've got the same password on my
luggage!  Oh... and change the password on my luggage.

...
 Back to the original point: a confirmation prompt for the agent has the
 potential to be useful in many cases, particularly with the agent model
 described for the upcoming gnupg 2.1, and to a lesser extent with
 earlier versions of the agent protocol.  I'm not denying that there are
 other approaches which might solve the same problem, but there are
 tradeoffs to all of them which may not be suitable for any particular
 user.

 I remain perplexed at the opposition this reasonable feature proposal
 has received.

I think it reminds some people of an Are you sure? prompt.  I realize
that's not exactly meant to be what this is for, of course, but that might
ultimately be what it feels like unless there's another outward purpose
for the prompt.

Now, that said, I'll just say I'm not against adding it if there's a
particular security case deemed worth defending.

   -- Chris

--

Chris Knadle
chris.kna...@coredump.us


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-13 Thread Daniel Kahn Gillmor
On 10/12/2010 02:46 PM, Werner Koch wrote:
 Anyway, if you are already have these permissions you can attack the
 keys with all kind of simple tricks.  Thus it is mood.

i'm not convinced it's moot, especially if i understand the model you're
advancing for the agent for 2.1 correctly.

If i run the agent locally, and forward access to it to a constrained
account, then the constrained account (which is talking to the agent)
*does not* have the ability to simulate such X11 events.

From a different perspective, i could run the agent itself in a
constrained account, and replace the prompting tool with a tool that
requires, say, an ACPI event, or a special keypress (not an X11 event)
from a designated hardware button.  in that case, malicious code with
access to the X11 session could detect that a prompt had been made, and
possibly dismiss it or hide it from the user, but could not force
acceptance of the keypress without superuser access (at which point,
game over anyway).  To take a vulnerability from a malicious use of
secret key material to a simpler denial of service attack strikes me as
a move in the right direction.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-13 Thread MFPA
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Hi


On Tuesday 12 October 2010 at 4:05:45 AM, in
mid:4cb3d089.3010...@fifthhorseman.net, Daniel Kahn Gillmor wrote:


 re-entering the passphrase each time is significantly
 more annoying than confirming its use in a reasonable
 context.  (and re-entering the passphrase every time
 the secret is used is less secure than a simple
 confirmation prompt, since it trains the user to type
 their passphrase over and over again)

The user can type their password once per session into a text file and
paste it every time it is requested. This reduces the annoyance factor
and does not train the user to constantly re-type the passphrase.

- --
Best regards

MFPAmailto:expires2...@ymail.com

Don't talk unless you can improve on the silence
-BEGIN PGP SIGNATURE-

iQCVAwUBTLY6qKipC46tDG5pAQo3wAP+Ib5WaZw6IGAiLkOCZFCXgZd0NJv2j+Qo
4ipPkPwdl+MjhnQG5iVMyc0IzFpJ5JJmK0y1pgwiSoRvZTh6mFy3U8af/YG+OIvE
cu9x4xLw7yaulurvQ8b1r27L2IQIM8/OQQAgN/UapLuLaIzj//ZhRm8GxYA3uZ2J
oSPTWL70TLw=
=Y292
-END PGP SIGNATURE-


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Werner Koch
On Tue, 12 Oct 2010 04:44, d...@fifthhorseman.net said:

 (e.g. one process can send a simulated mouseclick to another process
 pretty easily) but that doesn't mean no one is running with a

The standard pinentry grabs mouse and keyboard and thus we should be
protected against this kind of attack.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Daniel Kahn Gillmor
On 10/12/2010 02:26 AM, Werner Koch wrote:
 On Tue, 12 Oct 2010 04:44, d...@fifthhorseman.net said:
 
 (e.g. one process can send a simulated mouseclick to another process
 pretty easily) but that doesn't mean no one is running with a
 
 The standard pinentry grabs mouse and keyboard and thus we should be
 protected against this kind of attack.

I think that grabbing mouse and kbd prevents other tools from *reading*
the kbd and mouse events.  It doesn't prevent synthesized events from
triggering those inputs (e.g. clicking OK on a button).

As a simple example, try:

  sleep 3  xdotool key Return  echo GETPIN xxx | pinentry

The backgrounded process hits the enter key on a foregrounded (grabbed)
pinentry-gtk.

So while it's useful to protect passphrase entry from other snooping X11
applications, i don't think that the kbd/mouse grab approach is
sufficient protection for a simple confirmation prompt dialog box.

I'd be happy to be corrected on this if i'm wrong, of course.

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Hauke Laging
Am Dienstag 12 Oktober 2010 06:34:48 schrieb Robert J. Hansen:


 If my attack gives me unprivileged access I'm going to escalate it to root.

going to, yes.


 This is straight out of the malware
 playbook, and malware authors have a great many ways to achieve it.

I think that it is not useful to equalize unpriviledged and root access. This 
seems to me a bit ignorant of people trying to get their systems secure. :-)


 Heck, this doesn't even defend against an *unprivileged* attack.  Give
 me unprivileged access to your user account I'll edit your .profile to
 put a .malware/ subdirectory on your PATH and drop my trojaned GnuPG in
 there.

There are ways to prevent this. E.g. I protect important and hardly ever 
changed files like ~/.gnupg/options with root priviledge (chattr immutable on 
ext3). My most threatened processes (browser, IM) are covered by AppArmor 
profiles which hevily restrict access to $HOME but not to /tmp. These cannot 
access the secret keys, of course. But due to the new design of GnuPG 2.1 this 
may change.


 This seems like an niche solution to a problem which, as of right now,
 is nonexistent.

As Daniel already pointed out: Few people do but there are possibilities to 
harden your system. It would seem strange if of all things a security software 
put a limit to such efforts. Thus gpg should offer improvements even if these 
do not make much sense ALONE (which should be mentioned in the documentation).


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Hauke Laging
Am Dienstag 12 Oktober 2010 09:05:56 schrieb Daniel Kahn Gillmor:

 I think that grabbing mouse and kbd prevents other tools from *reading*
 the kbd and mouse events.  It doesn't prevent synthesized events from
 triggering those inputs (e.g. clicking OK on a button).

But this may change in the future. On the one hand you are free to have X 
clients running untrustedly (which should make that impossible) on the other 
hand I read rumores about the SELinux people heading at changes to their LSM 
in order to address the (more than obvious...) X problem.


Hauke
-- 
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814


signature.asc
Description: This is a digitally signed message part.
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Robert J. Hansen
On 10/12/2010 1:54 AM, Daniel Kahn Gillmor wrote:
 yes, of course this isn't going to be able to protect the user from
 someone with full access to their user account or their current session.

These two attack modes (root and user access) cover the overwhelming
majority of instances today, so already this hypothetical attack is an
exotic.  On top of that, your imagined situation seems to involve a
compromised machine communicating with a trusted server over a socket.
If the trusted server sends back a confirmation request, what's to keep
the malware from simply saying, OK, in response to these requests?

 Conversely, people won't run well-isolated subsystems if the tools we
 provide don't support reasonable separation and control in the first
 place.

Please do not mistake this for snark.  It's not.  I'm using an absurd
position here to try and make my objections clear, not because I'm
trying to denigrate your views.

That said: People will also not use GnuPG as a personal flotation
device in the event of a water landing if GnuPG does not float.

GnuPG is not a personal flotation device and, unsurprisingly, doesn't
have any features related to that.  This said, if users want GnuPG to
offer pontoon functionality in 2.2 they are certainly welcome to make
their opinions known.  If more than a dozen people say, yes, I need
GnuPG to serve as a personal flotation device, I will happily get out
of the way and encourage it to be added.

But to talk about how the people need personal flotation support in
GnuPG, without actually hearing from users who genuinely need it... I
might have great respect for the speakers and might even agree with
their opinions: but in the absence of user demand, I wouldn't think we
should do it.




smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Werner Koch
On Tue, 12 Oct 2010 09:05, d...@fifthhorseman.net said:

 the kbd and mouse events.  It doesn't prevent synthesized events from
 triggering those inputs (e.g. clicking OK on a button).

You are right.  However it is the only protection we can use on X; it
might be helpful in some cases, but as you showed not in this one.
Anyway, if you are already have these permissions you can attack the
keys with all kind of simple tricks.  Thus it is mood.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Werner Koch
On Tue, 12 Oct 2010 11:10, mailinglis...@hauke-laging.de said:

 There are ways to prevent this. E.g. I protect important and hardly ever 
 changed files like ~/.gnupg/options with root priviledge (chattr immutable on 

It doesn't help - you need to protect gpg.conf and gpg.conf-2 and
gpg.conf-2.0 and so on.  BTW, ~/.gnupg/options is deprecated for ages.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.


___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/11/2010 09:25 PM, Hauke Laging wrote:
 I just had the idea that it might be a good countermeasure against malicious 
 software not to use a cached passphrase without any user interaction (and 
 thus 
 without user notice). A good compromise would be to open a dialog which does 
 not ask for the passphrase but just for the confirmation that it's OK to use 
 the passphrase. The dialog could mention the process accessing gpg-agent.

I agree this would be useful, with a few notes:

 0) clients that have full access to the X session (or terminal, or
whatever mechanism is used for the prompting) can probably auto-accept
the prompt.  So malicious clients with this access wouldn't actually be
prevented from unauthorized access.  However, not all clients
necessarily have this level of access, so it can still be useful from
security perspective.

 1) gpg-agent might not be able to determine useful information about
requesting processes in some configurations, and on some operating systems.

 2) users should be able to specify which passphrases (or secret keys?)
they want to trigger a prompt for (some might not need or want a prompt).

 3) it would be nice for the prompting facility to be flexible enough to
support alternate prompt techniques (possibly differing from the
pinentry used to supply passphrases in the first place).  For example,
it would be nice if a prompt could only be accepted by some physical
response from the system (assuming the malicious client doesn't have
superuser access, in which case all bets are off anyway), even if the
alert for the prompt shows up via the windowing system or the console.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Robert J. Hansen
On 10/11/2010 9:25 PM, Hauke Laging wrote:
 I just had the idea that it might be a good countermeasure against 
 malicious software not to use a cached passphrase without any user 
 interaction (and thus without user notice).

The most obvious way I see to circumvent this involves throwing a
trampoline on the UI library and bypassing this code entirely. It's a
two-hour hack, assuming you already have root access to the system.  It
might make users *feel* more secure, but it doesn't actually help
overall system security -- IMO, at least.  YMMV.



smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/11/2010 10:20 PM, Robert J. Hansen wrote:
 On 10/11/2010 9:25 PM, Hauke Laging wrote:
 I just had the idea that it might be a good countermeasure against 
 malicious software not to use a cached passphrase without any user 
 interaction (and thus without user notice).
 
 The most obvious way I see to circumvent this involves throwing a
 trampoline on the UI library and bypassing this code entirely. It's a
 two-hour hack, assuming you already have root access to the system.

If you already have root access on the system, then yes -- all bets are
off.  but that's the case anyway when the malicious attacker has root
access.

 It
 might make users *feel* more secure, but it doesn't actually help
 overall system security -- IMO, at least.  YMMV.

It would help against the situation where the malicious client does
*not* have superuser access and cannot directly override the prompting
mechanism through other mechanisms.

Many standard X11 desktops today don't have such protections in place
(e.g. one process can send a simulated mouseclick to another process
pretty easily) but that doesn't mean no one is running with a
well-isolated gpg-agent.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hauke Laging wrote:
 Hello,
 
 I just had the idea that it might be a good countermeasure against malicious 
 software not to use a cached passphrase without any user interaction (and 
 thus 
 without user notice). A good compromise would be to open a dialog which does 
 not ask for the passphrase but just for the confirmation that it's OK to use 
 the passphrase. The dialog could mention the process accessing gpg-agent.
 
 
 CU
 
 Hauke
 

This seems like something that would get really annoying really
quickly. Why not just change settings to not cache the passphrase if
you do not like using it this way ?
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJMs8A+AAoJEPXCUD/44PWqVHUP/i2jbdt/AsYx2IlrrNqMdtjw
8lnxlUTeOfM11vOHD1CWctJsUH1LyhihKmf+0WZZRSv7k3S1vkVcIPD6zRmee4IS
AI+3wvtlGdsF/+BlMeelCMMdaU8ys4OB4YbfQdaftAsBsO3IqZ32K1VLkMcje6Wd
YdREF/dDEzD41tJ/oQLwxW8Ek9IBTUDrA7p1HdCuzf5YfqdDF0eLvTaGXCK6mO7e
RJeSLlelQs7kgTq1KEvOAMGgpF8vye8soLN3aJcxkZnjp991Eeus6ZIhxdYRoXIz
o7sPTf8ejctUrgGrW00hVUoUMhCdKN+ELx4Ux0fIgDGzMVItYRDXrAnbTeuZ2z3x
/3gBAQbAQWWvFXQZ6CQT3uNJQVtOmTwber8DjSaSRsRxNsQbh15SeOIHEGgI73wk
xEfvoL7iirMOcVmjndGc6063nUPvhJyotvefafrOKbL3vae7C8480x1kc0uhB2Ry
U9daKonVyCPGyqAhqem1oYpPjjD2aUuyDzLM4y7t0yfKAwEqjL+vQogGfilyKYhy
U+g/OybkgQLckG5RgnEcqzlIcSWPdnl6eIxc/YF8EMxYpcXrZhXMrGkk8fDVC36R
3TM/siVhttdo7v9ekFxT3eOF/6vsKoASpP1Vz4aZXpSQ8a3/WRW5eDyQ6li4goKH
Ub+vZOmMc14HvzSAlBpt
=+JVD
-END PGP SIGNATURE-

___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/11/2010 09:56 PM, Larry Brower wrote:
 This seems like something that would get really annoying really
 quickly. Why not just change settings to not cache the passphrase if
 you do not like using it this way ?

re-entering the passphrase each time is significantly more annoying than
confirming its use in a reasonable context.  (and re-entering the
passphrase every time the secret is used is less secure than a simple
confirmation prompt, since it trains the user to type their passphrase
over and over again)

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Robert J. Hansen
On 10/11/2010 10:44 PM, Daniel Kahn Gillmor wrote:
 It would help against the situation where the malicious client does
 *not* have superuser access and cannot directly override the prompting
 mechanism through other mechanisms.

This attack mode appears to me to be so niche that I don't see any point
in defending against it.  If my attack gives me local access I'm going
to shoot for remote.  If my attack gives me unprivileged access I'm
going to escalate it to root.  This is straight out of the malware
playbook, and malware authors have a great many ways to achieve it.

Heck, this doesn't even defend against an *unprivileged* attack.  Give
me unprivileged access to your user account I'll edit your .profile to
put a .malware/ subdirectory on your PATH and drop my trojaned GnuPG in
there.  Once the malware executes, delete the hidden subdirectory,
restore your original PATH, and send the passphrase it intercepted off
towards my C4I server.

And if we're assuming I've instead subverted an unprivileged non-user
account (like a jailed service), then this attack is a nonissue, so
why are we trying to solve it?

This seems like an niche solution to a problem which, as of right now,
is nonexistent.



smime.p7s
Description: S/MIME Cryptographic Signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users


Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/12/2010 12:34 AM, Robert J. Hansen wrote:
 Heck, this doesn't even defend against an *unprivileged* attack.  Give
 me unprivileged access to your user account I'll edit your .profile to
 put a .malware/ subdirectory on your PATH and drop my trojaned GnuPG in
 there.  Once the malware executes, delete the hidden subdirectory,
 restore your original PATH, and send the passphrase it intercepted off
 towards my C4I server.

yes, of course this isn't going to be able to protect the user from
someone with full access to their user account or their current session.

Agents like gnupg-agent and other socket-driven services are capable of
being exported over heavily-constrained connections, where only access
to the agent's socket is given to the attacker.  For example, you can
forward ssh-agent over the network to a process on a remote host, or set
up a simple socket-forwarding service within a machine to grant access
to your gnupg-agent to other user accounts.

As an example, I know people who run their web browser in a
heavily-constrained mode, e.g. under a separate user account, in a
virtual machine or VNC session.  If such a browser (or a plugin to it)
wants access to the principal user's agent, it has only one recourse,
which is to talk to the agent's socket.  (This sort of constraint is
much more effective with the ssh-agent model, where secret key material
never leaves the agent, as opposed to the traditional gpg-agent model
where the agent is only a passphrase cache; it sounds like gpg-agent is
planning to adopt the ssh-agent model as of 2.1, which is great news.)

 And if we're assuming I've instead subverted an unprivileged non-user
 account (like a jailed service), then this attack is a nonissue, so
 why are we trying to solve it?

If the specialized/jailed account has access to such a forwarded agent,
then an attack against it *is* an issue.  It would be good to be able to
grant gpg-agent access to the constrained service when it requests it
reasonably, and to be able to deny it when it requests access unreasonably.

 This seems like an niche solution to a problem which, as of right now,
 is nonexistent.

Conversely, people won't run well-isolated subsystems if the tools we
provide don't support reasonable separation and control in the first
place.  Do we want to build tools that support secure use?  If so,
implementing Hauke's suggestion at least in the GPG 2.1 branch is a good
idea.  And previous branches would be nice too, though the classic
gpg-agent communication model (passphrase-cache-only) is too weak for
the proposed confirmation prompt to enable well-isolated use.

--dkg



signature.asc
Description: OpenPGP digital signature
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users