On Mon, 11 Sep 2006, Wouter Bolsterlee wrote:
På Mon, Sep 11, 2006 at 08:41:58AM +0200, Alexander Larsson skrev:
Interesting. However, isn't there a small security value in protecting
just the fact that you have a password stored for a particular target?
And anyway, you need to unlock the keyring at least, because all that
information is stored encrypted.
And that's where pam-keyring comes into play:
Yes, and it is an very stupid idea to use it. Reading those entries, it
would appear you are just being lazy and care little about security.
I don't see the point in saving yourself a few keystrokes, especially
since you only have to type your ssh passphrases once (at the beginning
of your session), and your gnome keyring passphrase also only once. I
would advise strongly against using it.
BTW, you do know the difference between passwords (like those being used
to log in) and passphrases (like the ones to unlock your ssh/pgp keys),
right?
[1] http://uwstopia.nl/blog/2006/08/password-hell-gdm-ssh-gnome-keyring
[2] http://uwstopia.nl/blog/2006/08/password-hell-part-ii
mvrgr, Wouter
kr,
Chipzz AKA
Jan Van Buggenhout
--
------------------------------------------------------------------------
UNIX isn't dead - It just smells funny
[EMAIL PROTECTED]
------------------------------------------------------------------------
"Baldric, you wouldn't recognize a subtle plan if it painted itself pur-
ple and danced naked on a harpsicord singing 'subtle plans are here a-
gain'."_______________________________________________
desktop-devel-list mailing list
[email protected]
http://mail.gnome.org/mailman/listinfo/desktop-devel-list