On Tue, 12 Apr 2016 03:56:17 AM Andrew McGlashan via luv-main wrote:
> On 11/04/2016 4:24 PM, Brian May via luv-main wrote:
> > Andrew McGlashan via luv-main <[email protected]> writes:
> >> What exactly does gpg2 offer that makes it more suitable than gpg for
> >> most usage?
> > 
> > I believe they rewrote gnupg-agent to actually make it secure - like
> > ssh-agent - instead of just storing your passphase it stores the private
> > key and denies any processes getting direct access to the unencrypted
> > private key. This also has other advantages apart from just security.
> 
> I use 0 minutes to cache my passphrase, so that should make me safe?

It depends on what types of attack you are vulnerable to.

If there is a possibility of someone observing your keyboard (or monitoring 
the sound of key presses if you are more paranoid) then reducing the frequency 
of passphrase use is good for security - IE longer cache times.

If you have a device that doesn't permit root access (IE the logged in account 
doesn't have sudo permission) and the cache is secure (locked memory from a 
SUID/SGID process) then it might be better to have the cache remain for a long 
time.

An attack on cache memory (or process address space for temporary storage of 
the passphrase and/or decrypted private key) is something that could hang 
around.  As gpg is no longer SGID (when did that change happen?) it's possible 
for any other process under the same UID to ptrace it.

-- 
My Main Blog         http://etbe.coker.com.au/
My Documents Blog    http://doc.coker.com.au/
_______________________________________________
luv-main mailing list
[email protected]
https://lists.luv.asn.au/cgi-bin/mailman/listinfo/luv-main

Reply via email to