Thanks for taking the time to report this bug and helping to make Ubuntu 
better.  This is not a bug, but rather expected behavior:
https://wiki.ubuntu.com/SecurityTeam/FAQ#gnome-keyring

Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

** Changed in: gnome-keyring (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1913584

Title:
  passwords openly readable from gnome-keyring-daemon

Status in gnome-keyring package in Ubuntu:
  Invalid

Bug description:
  I'm using Lubuntu 20.04 and just configured a command line mail client
  (mutt / neomutt) to access an imap mailbox, and to avoid storing the
  password as plaintext in the .muttrc, I used the recommended method
  like

  set imap_pass            = "`secret-tool lookup login mailaddress`"

  to retrieve the password from the gnome-keyring. When the gnome-
  keyring is accessed for the first time in a session, a requester
  prompts for the keyring password, since passwords are stored encrypted
  in ~/.local/share/keyrings.

  But then, once the keyring password had been entered at the beginning
  of a session, because it has been used in the intended way, the
  keyring remains open for the rest of the desktop session (possibly for
  a very long time), enabling any other program that can launch secret-
  tool as a sub process or access the dbus , can read that password.

  So virtually this is, once logged in, not any more secure that storing
  the password in a regular file with mod 0600, i.e. not more secure
  than writing the password directly into the .muttrc. It's just a
  slight improvement sind files are not stored in plaintext on disk (but
  the disk should be encrypted anyways).


  Is that intended?

  What's the point in using a 'keyring daemon', if it is not more secure
  than a regular file, and just any program can read the passwords?

  After all, it is usually a central design requirement for
  password/secret storage programs (such as keepass), that other
  programs (which, under regular user sessions, cannot access the RAM of
  other running processes) cannot access the passwords without users
  explicit consent. It's a violation of the idea of a password safe, if,
  once open, any program can read it just like any file.

  regards

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: gnome-keyring 3.36.0-1ubuntu1
  ProcVersionSignature: Ubuntu 5.4.0-60.67-generic 5.4.78
  Uname: Linux 5.4.0-60-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu27.14
  Architecture: amd64
  CasperMD5CheckResult: skip
  CurrentDesktop: LXQt
  Date: Thu Jan 28 14:14:49 2021
  InstallationDate: Installed on 2020-06-12 (229 days ago)
  InstallationMedia: Lubuntu 20.04 LTS "Focal Fossa" - Release amd64 (20200423)
  SourcePackage: gnome-keyring
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1913584/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to