Hello!
I need a setup where the user running "gpg -e -r foobar" is not able to
modify keyring contents. I tried:
# chown -R root:user ~user/.gnupg
# chmod -R o=rwX,g=rX,o= ~user/.gnupg
Unfortunately, this don't work because gpg does some write operations
in its .gnupg directory:
1. It locks the keyring. --lock-never will avoid this. Is it safe
to use --lock-never as long as it is guaranteed that _only_ "gpg -e"
is ever run? No key generation, no imports, no signung. Only
"gpg -e". Is this safe?
2. There's the random_seed file. It is modified at every run. How can
I handle this? I bet it would be a security problem should someone
be able to read this file. Would it be possible to put it into a
different directory?
3. gpg writes temporary files into ~/.gnupg while encrypting.
Any ideas?
_______________________________________________
Gnupg-users mailing list
[email protected]
http://lists.gnupg.org/mailman/listinfo/gnupg-users