> This is most likely the result of the PIN entry thing being involved.
> For libgpgme engines that require PIN entry, the only way I know of to
> get around this is to remove the password from the gpg key. Or you can
> use gpg-agent, but that usually isn't a good solution for a remote
> system you want access to (reboots for whatever reason, passwords
> getting timed out of gpg-agent, etc.). If you want to take this step,
> you'll need to use the GPG_ALLOW_NO_PW variable in the access.conf stanza:
> 
> *GPG_ALLOW_NO_PW* /<Y/N>/
> 
>     Allow *fwknopd* to leverage a GnuPG key pair that does not have an
>     associated password. While this may sound like a controversial
>     deployment mode, in automated environments it makes sense because
>     "there is usually no way to store a password more securely than on
>     the secret keyring itself" according to:
>     
> "http://www.gnupg.org/faq/GnuPG-FAQ.html#how-can-i-use-gnupg-in-an-automated-environment";.
>     Using this feature and removing the passphrase from a GnuPG key pair
>     is useful in some environments where libgpgme is forced to use
>     gpg-agent and/or pinentry to collect a passphrase.
> 
> 
>  
> 
> 
>     Btw, annoying non-technical question and I know there's probably no
>     'objective' answer but how much more secure is the system when using gpg
>     keys (+HMAC digests), assuming a 'proper' implementation (whatever that
>     means!)?
> 
> 
> In some sense, the most important aspect of SPA communications is
> authentication instead of encryption. That is, most usages of SPA are
> going to ask for access to SSH, and frequently the IP to be allowed will
> be the source IP of the SPA packet. So, there aren't too many "secrets"
> that need the protection of encryption (yes, there are a few other
> things sent in the fwknop SPA payload, but the point stands). The main
> thing is to authenticate the payload so that it can't be tampered with
> en-route. The HMAC is critical.
> 
> However, if you are doing something more advanced or different, such as
> using the ghost services feature
> (http://cipherdyne.org/blog/2009/11/creating-ghost-services-with-single-packet-authorization.html)
> or using fwknop as a command channel, then encryption becomes more
> important because the contents of the payload contain non-default
> information worthy of protecting. And, even if you aren't doing
> something like this, there's no reason to not encrypt anyway.
> 
> Now, for gpg vs. AES, fwknop's usage of 256-bit AES is vastly "more than
> enough" in terms of security. Some users gravitate towards gpg though
> because of workflow differences, gpg-agent, key distribution, etc., but
> there is no reason to move away from AES in terms of its ability to
> strongly encrypt data.
> 
> To me, deploying fwknop in the most secure manner is done by using the
> --key-gen option to generate symmetric encryption and HMAC keys and then
> compiling fwknopd without gpg support and also without pcap support
> (--udp-server mode). Yes, this means the firewall must allow SPA packets
> through to the UDP port where fwknopd is listening, but fwknopd never
> answers anything so it is indistinguishable from a default-drop firewall
> policy stance anyway.
> 
> Thanks,
> 
> --Mike
> 
>  

Thanks a lot Mike.  "More than enough" was exactly the kind of answer I
expected/hoped you'd provide.  My use is fairly "plain vanilla" so I
think by-passing some of the more fiddly aspects of GPG (as per my
current issues) is probably sensible and efficient.

Anyway, from my POV, it's a thoroughly educational and enjoyable
experience getting the software up and running.  Thanks so much for your
valuable and ongoing contribution.

Cheers,

Adam

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Fwknop-discuss mailing list
Fwknop-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fwknop-discuss

Reply via email to