"Steven M. Bellovin" <[EMAIL PROTECTED]> said:
> in the Holy Name of Convenience, many (most?) mailers  permit a
> passphrase to be cached for some amount of time.  A virus  could
> exploit that.

Ok. So, you're reasoning on the assumption that the user and her system 
enginer are both incompetent, that the software being used cannot be trusted
and that a virus is potentially already active on the user's system. Under 
such assumptions, what do you foresee as a possible solution?

When I said:
>I would hope that any software I use, that is able to put my digital signature
>on some data, would ask me for my pass-phrase every time my private key is 
>used.

I meant that these were my requirements for a reliable system. But, unless I
were to be provided with all the sources and took the time to carefully analyze
them, I would, in the end, still be relying on somebody else's "promise" that
the software doesn't do anything stupid with my private key. The least I could
do, though, is to check that the system I use at least pretends to be doing 
what I consider safe to do. Still, when I disable scripting in my mail user 
agent and my browser, can I be 100% sure that no script will ever be executed?

"Steven M. Bellovin" <[EMAIL PROTECTED]> also said:
> A virus [snip] could wait until you tried sending
> some  signed mail, and grab the key then.  It could even wait, and
> then pop  up its own key window that masquerades as the real one,
> followed by a  box saying that you entered your passphrase
> incorrectly, and that you  should retry it, in the real prompt.  There
> are operating system  techniques that can prevent that latter attack,
> such as the "trusted  path".

Interesting. Do you have a reference (preferably a URL) that describes the
"trusted path" technique?

Peace,

Bertrand Ibrahim.
--------------------------------------------
[EMAIL PROTECTED]
http://cui.unige.ch/eao/www/Bertrand.html

Reply via email to