As long as the passwords are not stored in plain text in memory - meaning they 
are only temporarily decoded in order to be provided (and then the memory 
wiped) - there is no difference than the underlying security of the file 
encryption on disk, no ?

> On Oct 15, 2018, at 4:13 PM, Christopher Nielsen <m4dh4t...@gmail.com> wrote:
> 
> On Mon, Oct 15, 2018 at 1:28 PM Matthias Schmidt
> <matthias.schm...@gmail.com> wrote:
>> 
>> Hi Eric,
>> 
>> thanks *a lot* for your valuable feedback! I really appreciate it. See 
>> comments inline:
>> 
>> Am Montag, 15. Oktober 2018 12:09:32 UTC+2 schrieb EricR:
>>> 
>>> Since you're looking for opinions on the security concept, two questions 
>>> spring immediately to my mind:
>>> 
>>> 1. Does the daemon keep the sensitive data in locked memory that cannot be 
>>> paged out? If so, how cross-platform is this?
>> 
>> 
>> No it doesn't. As of now i consider the root-user a good guy ;-)
>> He's the only one who could access the pagefiles anyway.
>> 
>> So is this really an issue? If yes i could use this cross-platform solution 
>> to pin the key:
>> 
>> https://github.com/awnumar/memguard
>> 
>> 
>>> 
>>> 
>>> 2. How does the client communicate securely with the daemon? Which 
>>> encryption protocol/handshake is used for this? (If it just uses a socket, 
>>> what would prevent another process from reading out the master password?)
>> 
>> 
>> It's in fact a unix domain socket file which is only accessible for the 
>> owner of the key. ( Thanks for bringing this up, i forgot to flag the file 
>> correctly - it's now fixed).
>> Relying on the file permissions in unix shouldn't be a problem, right?
>> 
>> cheers & again - many thanks,
>> 
>> Matthias
> 
> You seem to be putting a lot of trust in facilities that are trivially
> exploitable to a determined attacker. For software like a password
> manager, assuming the kernel is secure is a poor security model. In
> addition to the existing attack surface, we live in a world where
> side-channel attacks are becoming more common, e.g., Spectre and
> Meltdown, so it isn't safe to assume the kernel or hardware are
> secure. A password manager needs to have a robust security model that
> has a minimal trust model if it is to be more than a toy.
> 
> Just my $0.02
> 
> -- 
> Christopher Nielsen
> "They who can give up essential liberty for temporary safety, deserve
> neither liberty nor safety." --Benjamin Franklin
> "The tree of liberty must be refreshed from time to time with the
> blood of patriots & tyrants." --Thomas Jefferson
> 
> -- 
> You received this message because you are subscribed to the Google Groups 
> "golang-nuts" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to golang-nuts+unsubscr...@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to