-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Marek Marczykowski-Górecki: > On Fri, Jun 10, 2016 at 12:49:23AM +0200, HW42 wrote: >> Andrew David Wong: >>> On 2014-11-12 19:35, HW42 wrote: >>>> Hi, >>> >>>> I developed (a prototype of) split-gpg for GnuPG 2.1 (simply >>>> called split-gpg2). [...] >>> >>> Hi HW42, >>> >>> What's the current status of this? > >> It's currently nearly unchanged since I created it. I have been using it >> since then. > >>> and what more needs to be done? > >> I wan't to change the way how the gpg-agent replacement on the client >> side is started and by the way fix the case when the user doesn't answer >> the accept dialog. > >> Marek proposed to ask per key. Currently it asks only once for all >> accesible keys. > > Especially when qrexec (in Qubes 3.2) got support for argument to which > you can apply policy: > https://github.com/QubesOS/qubes-issues/issues/1876 > https://www.qubes-os.org/doc/qrexec3/#service-argument-in-policy > > This would allow setting a policy to access one key but not some other, > without creating per-key backend VM. Somehow less secure than separate > VMs, but also much more resources effective.
Yes. There are two possible ways to separate per key in the backend VM. One way is to run different gpg-agents in different GNUPGHOMEs (that's already supported but you can only select based on the source VM name due to the lack of policy arguments). The other possibility is to track which key is select for the requested operation. The solution with different GNUPGHOMEs has the advantage that it is more secure since there is no risk that the filter and the gpg-agent interpret the protocol differently in regard to which key is selected. The downside of multiple GNUPGHOMEs is that gpg2 (running in the frontend) can talk to only one gpg-agent. So you need to decide which GNUPGHOME on the backend should be used. Therefore you can't conveniently allow a VM access to multiple keys and get asked per key. Both variants can be combined. For example allow access per GNUPGHOME based on the policy argument and then ask in the popup per key in this GNUPGHOME. >> A qubes-builder Makefile needs to be added (packaging it self should be >> (mostly) done). > >> It might be useful to reimplement it in python so it better fits into the >> Qubes environment (for example rubys regex behave a litlle bit different >> then pythons). > > This is currently the main reason why it isn't included even in unstable > repository. I don't know ruby enough to review it... > Anyway, even if someone would review it, it would be better to not > have just another language in Qubes components, exactly for the reason > above - to make review easier (not require knowledge of all the > programming languages). Ack. >>> Are you still working on it? > >> As mentioned above it has been untouched since a while (especially the >> last months I didn't had much time in general). But I'm still planing to >> work on it. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJXWf6RAAoJEOSsySeKZGgWtR0P/1BChNSSrSQ29/BV04uVnbgx 4BI6gmrBB2yYKAlBdQ3oOowxB6LXBJaFPBVPGxRdu4JFDVL/FPKDDwz27kHHamX1 NPh95hBTbbSglTQIu6xY2MJ0iuPGbPW6wjNJ8Dbea4V4KKOyywsntQAQdOOiRPe+ UadBOkE5bFqxnSxTdH8k0C/xwDpWNyKMTOQYSBqSH2KWDjgaPyxaQPkHJ0J6fSUh 0Kn6zBltSl4GezUT0tLUT6YTO+FZ0RhpCiOUT1Am2GdB45pFK1Mglf71D63I0mCT gSj4eMK2PjqUElzyYpyauG6QDCveVe1kmr3QRig5GJ90i0wKH9LQib+LBrfwihd7 X8IKWTwagkxGPvuir9H3s49OBRsOt89YUrDtJCkTnjmyPgPHsFJphBCoA8XVkofW erh1GZlhiJ2LbUPgHRSaSB/FsfCLXAkWIPL/L2fAvatnWFP44QIy7XQOlzhMj1co QcNzqBI5s/W926TgqJyINzEkEBnF6Usjdxz3zkX4pAUG6JxqetzOdIqa5wbNPhA8 WgKBDksZOHearXRqyT0hhX8kynzlGmBhF+Hm0Cl+aUnQm57q1pe3BRk0LaqF59+h GxPuSj7qcRKHZARWnK/V54z7GX54DJ2z4rMiljruApGiCWzb5h7wUhYlRxA0V3n7 znJNhFb2k7xAb0bXvZvm =mtQV -----END PGP SIGNATURE----- -- You received this message because you are subscribed to the Google Groups "qubes-devel" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-devel/bb262525-6af7-a22a-d256-e16cbaf01854%40ipsumj.de. For more options, visit https://groups.google.com/d/optout.
