Re: Confirmation for cached passphrases useful?

2010-10-23 Thread Ingo Klöcker
On Monday 18 October 2010, Faramir wrote: El 17-10-2010 22:09, Doug Barton escribió: On 10/17/2010 5:43 PM, Faramir wrote: |That may be true. However, remember feeling secure is part of |security | | too, so if that feature doesn't break anything, and make people | sleep

Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 15-10-2010 14:31, Doug Barton escribió: On 10/15/2010 9:23 AM, Werner Koch wrote: Nevertheless, the confirmation prompt for a cached passphrase is not entirely unfounded ... The other problem with the confirmation proposal is that (unless I'm

Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 15-10-2010 20:29, Jameson Rollins escribió: No, I was just curious why, if you were an ssh-agent user, you would be ok with the implementation there but not for gpg-agent. If you're not an ssh-agent user then you have nothing to get

Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Doug Barton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 10/17/2010 5:43 PM, Faramir wrote: | |That may be true. However, remember feeling secure is part of security | too, so if that feature doesn't break anything, and make people sleep | better... Two problems with that theory. The first is

Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 17-10-2010 22:09, Doug Barton escribió: On 10/17/2010 5:43 PM, Faramir wrote: | |That may be true. However, remember feeling secure is part of security | too, so if that feature doesn't break anything, and make people sleep | better...

Re: Confirmation for cached passphrases useful?

2010-10-17 Thread Faramir
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 El 17-10-2010 23:47, Robert J. Hansen escribió: ... And if one day the user finds it has been disabled somehow, the user might become aware of some malware in the machine... By this logic every user should have a big piece of Scotch tape on

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Werner Koch
On Wed, 13 Oct 2010 17:51, d...@fifthhorseman.net said: If i run the agent locally, and forward access to it to a constrained account, then the constrained account (which is talking to the agent) *does not* have the ability to simulate such X11 events. You mean to a different X server? For

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Hauke Laging
Am Freitag 15 Oktober 2010 12:28:33 schrieb Werner Koch: If there is malicious code running on your machine with access to resources under your control, I can only say: game over. No external button will help you here. That's why we try to restrict the access of malicious code, isn't it?

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Werner Koch
On Thu, 14 Oct 2010 20:03, sascha-ml-reply-to-201...@silbe.org said: One instance where the proposed mechanism (in conjunction with the new version of gpg-agent that will handle the secret keys itself) would be Just for the records: This is no new mechanism of the agent. It is in use for

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Werner Koch
On Fri, 15 Oct 2010 12:55, mailinglis...@hauke-laging.de said: Following your pessimistic attitude there would hardly be any reason not to work as root. Nope. Not working under root is important to keep the system stable and provide access restrictions to the non-malicious users. OTOH, it

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Doug Barton
On 10/15/2010 9:23 AM, Werner Koch wrote: Nevertheless, the confirmation prompt for a cached passphrase is not entirely unfounded I've really been biting my tongue on this thread because it seemed like the right people were saying the right things already, but you're making me nervous now

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
On 10/15/10 1:31 PM, Doug Barton wrote: The other problem with the confirmation proposal is that ... the intersection between plausible attack vectors and vulnerabilities that [this proposal] would actually fix seems [very] small. I seem to recall saying something similar to this a few days

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
On 10/15/10 2:49 PM, Jameson Rollins wrote: Without use confirmation in the agent, a malicious program running under your account could access your secret key without you knowing it. This can still happen with a confirmation prompt. Confirmation cannot protect against malware running under

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
Ok, then this protects against malicious programs that are not intercepting the dialog box. Which means that six months after this feature gets implemented, the malware authors will write exploits that intercept the dialog box. Arms races are inevitable, but stupid arms races should be

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Grant Olson
On 10/15/10 5:04 PM, Jameson Rollins wrote: Don't let the perfect be the enemy of the good. But is it good? To me this feature seems like security theater. It makes you feel all warm and fuzzy and lets you sleep at night, but doesn't provide any real protection. Is it good to have users

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Jameson Rollins
On Fri, 15 Oct 2010 18:23:04 -0400, Robert J. Hansen r...@sixdemonbag.org wrote: I'm not. This idea isn't good. Do you use ssh-agent? Do you think their implementation of the same thing is not good? If so, have you complained to them about it, or asked why the implemented it? jamie.

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Hauke Laging
Am Samstag 16 Oktober 2010 00:23:04 schrieb Robert J. Hansen: Ok, then this protects against malicious programs that are not intercepting the dialog box. Which means that six months after this feature gets implemented, the malware authors will write exploits that intercept the dialog box.

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
Do you use ssh-agent? Do you think their implementation of the same thing is not good? If so, have you complained to them about it, or asked why the implemented it? This seems to be an argument from implication of hypocrisy: as if, were I a user of ssh-agent, my opinion regarding gpg-agent

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
This implies the strange claim that it will forever be possible to do that. It does not. It states that at present the OS infrastructure we have makes implementing this a losing proposition. As soon as the OS infrastructure changes enough to make this a winner, then we should revisit this

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Jameson Rollins
On Sat, 16 Oct 2010 01:05:11 +0200, Hauke Laging mailinglis...@hauke-laging.de wrote: I just don't like the idea that access to the agent is not noticed by design. I strongly agree with this point. Let's think about it another way: what if the user is themselves doing something that is

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Jameson Rollins
On Fri, 15 Oct 2010 19:12:21 -0400, Robert J. Hansen r...@sixdemonbag.org wrote: Do you use ssh-agent? Do you think their implementation of the same thing is not good? If so, have you complained to them about it, or asked why the implemented it? This seems to be an argument from

Re: Confirmation for cached passphrases useful?

2010-10-15 Thread Robert J. Hansen
I strongly agree with this point. Let's think about it another way: what if the user is themselves doing something that is unintentionally accessing the key? Then that's the user's own problem. They're the one who decided to enable passphrase caching and to set a large timeout window. They

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Daniel Kahn Gillmor
On 10/13/2010 07:02 PM, MFPA wrote: The user can type their password once per session into a text file and paste it every time it is requested. This reduces the annoyance factor and does not train the user to constantly re-type the passphrase. This strikes me as the worst suggestion on this

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread martin f krafft
also sprach MFPA expires2...@ymail.com [2010.10.14.0102 +0200]: The user can type their password once per session into a text file and paste it every time it is requested. This reduces the annoyance factor and does not train the user to constantly re-type the passphrase. That's a great idea.

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Dan Cowsill
On 13/10/2010 4:02 PM, MFPA wrote: The user can type their password once per session into a text file and paste it every time it is requested. This reduces the annoyance factor and does not train the user to constantly re-type the passphrase. I use a program called KeePass to keep track of my

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Sascha Silbe
Excerpts from Robert J. Hansen's message of Tue Oct 12 15:25:50 +0200 2010: These two attack modes (root and user access) cover the overwhelming majority of instances today, so already this hypothetical attack is an exotic. That most mainstream systems are painfully easy to attack doesn't

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Grant Olson
On 10/13/10 11:51 AM, Daniel Kahn Gillmor wrote: From a different perspective, i could run the agent itself in a constrained account, and replace the prompting tool with a tool that requires, say, an ACPI event, or a special keypress (not an X11 event) from a designated hardware button. in

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Daniel Kahn Gillmor
On 10/14/2010 04:31 PM, Grant Olson wrote: But ultimately once you start trying to fix the problem by offloading the checks to special hardware, you might as well just key a smart card reader with an integrated keypad. Then you can use a simple pin. Not quite as convenient as hitting Y/N,

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Thursday 14 October 2010 at 3:18:47 PM, in mid:4cb71147.5090...@fifthhorseman.net, Daniel Kahn Gillmor wrote: This strikes me as the worst suggestion on this thread so far. Please, do not store the passphrase to your secret key in the

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Hauke Laging
Am Dienstag 12 Oktober 2010 04:44:41 schrieb Daniel Kahn Gillmor: (e.g. one process can send a simulated mouseclick to another process pretty easily) I am not familiar with X details (let alone that other one OS). Does grabbing the mouse prevent other processes from knowing where the click

Re: Confirmation for cached passphrases useful?

2010-10-14 Thread Chris Knadle
On Thu, October 14, 2010 4:54 pm, Daniel Kahn Gillmor wrote: On 10/14/2010 04:31 PM, Grant Olson wrote: But ultimately once you start trying to fix the problem by offloading the checks to special hardware, you might as well just key a smart card reader with an integrated keypad. Then you can

Re: Confirmation for cached passphrases useful?

2010-10-13 Thread Daniel Kahn Gillmor
On 10/12/2010 02:46 PM, Werner Koch wrote: Anyway, if you are already have these permissions you can attack the keys with all kind of simple tricks. Thus it is mood. i'm not convinced it's moot, especially if i understand the model you're advancing for the agent for 2.1 correctly. If i run

Re: Confirmation for cached passphrases useful?

2010-10-13 Thread MFPA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi On Tuesday 12 October 2010 at 4:05:45 AM, in mid:4cb3d089.3010...@fifthhorseman.net, Daniel Kahn Gillmor wrote: re-entering the passphrase each time is significantly more annoying than confirming its use in a reasonable context. (and

Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Werner Koch
On Tue, 12 Oct 2010 04:44, d...@fifthhorseman.net said: (e.g. one process can send a simulated mouseclick to another process pretty easily) but that doesn't mean no one is running with a The standard pinentry grabs mouse and keyboard and thus we should be protected against this kind of attack.

Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Daniel Kahn Gillmor
On 10/12/2010 02:26 AM, Werner Koch wrote: On Tue, 12 Oct 2010 04:44, d...@fifthhorseman.net said: (e.g. one process can send a simulated mouseclick to another process pretty easily) but that doesn't mean no one is running with a The standard pinentry grabs mouse and keyboard and thus we

Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Hauke Laging
Am Dienstag 12 Oktober 2010 06:34:48 schrieb Robert J. Hansen: If my attack gives me unprivileged access I'm going to escalate it to root. going to, yes. This is straight out of the malware playbook, and malware authors have a great many ways to achieve it. I think that it is not useful

Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Hauke Laging
Am Dienstag 12 Oktober 2010 09:05:56 schrieb Daniel Kahn Gillmor: I think that grabbing mouse and kbd prevents other tools from *reading* the kbd and mouse events. It doesn't prevent synthesized events from triggering those inputs (e.g. clicking OK on a button). But this may change in the

Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Robert J. Hansen
On 10/12/2010 1:54 AM, Daniel Kahn Gillmor wrote: yes, of course this isn't going to be able to protect the user from someone with full access to their user account or their current session. These two attack modes (root and user access) cover the overwhelming majority of instances today, so

Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Werner Koch
On Tue, 12 Oct 2010 09:05, d...@fifthhorseman.net said: the kbd and mouse events. It doesn't prevent synthesized events from triggering those inputs (e.g. clicking OK on a button). You are right. However it is the only protection we can use on X; it might be helpful in some cases, but as you

Re: Confirmation for cached passphrases useful?

2010-10-12 Thread Werner Koch
On Tue, 12 Oct 2010 11:10, mailinglis...@hauke-laging.de said: There are ways to prevent this. E.g. I protect important and hardly ever changed files like ~/.gnupg/options with root priviledge (chattr immutable on It doesn't help - you need to protect gpg.conf and gpg.conf-2 and gpg.conf-2.0

Confirmation for cached passphrases useful?

2010-10-11 Thread Hauke Laging
Hello, I just had the idea that it might be a good countermeasure against malicious software not to use a cached passphrase without any user interaction (and thus without user notice). A good compromise would be to open a dialog which does not ask for the passphrase but just for the

Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/11/2010 09:25 PM, Hauke Laging wrote: I just had the idea that it might be a good countermeasure against malicious software not to use a cached passphrase without any user interaction (and thus without user notice). A good compromise would be to open a dialog which does not ask for

Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Robert J. Hansen
On 10/11/2010 9:25 PM, Hauke Laging wrote: I just had the idea that it might be a good countermeasure against malicious software not to use a cached passphrase without any user interaction (and thus without user notice). The most obvious way I see to circumvent this involves throwing a

Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/11/2010 10:20 PM, Robert J. Hansen wrote: On 10/11/2010 9:25 PM, Hauke Laging wrote: I just had the idea that it might be a good countermeasure against malicious software not to use a cached passphrase without any user interaction (and thus without user notice). The most obvious way

Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Larry Brower
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hauke Laging wrote: Hello, I just had the idea that it might be a good countermeasure against malicious software not to use a cached passphrase without any user interaction (and thus without user notice). A good compromise would be to open a

Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/11/2010 09:56 PM, Larry Brower wrote: This seems like something that would get really annoying really quickly. Why not just change settings to not cache the passphrase if you do not like using it this way ? re-entering the passphrase each time is significantly more annoying than

Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Robert J. Hansen
On 10/11/2010 10:44 PM, Daniel Kahn Gillmor wrote: It would help against the situation where the malicious client does *not* have superuser access and cannot directly override the prompting mechanism through other mechanisms. This attack mode appears to me to be so niche that I don't see any

Re: Confirmation for cached passphrases useful?

2010-10-11 Thread Daniel Kahn Gillmor
On 10/12/2010 12:34 AM, Robert J. Hansen wrote: Heck, this doesn't even defend against an *unprivileged* attack. Give me unprivileged access to your user account I'll edit your .profile to put a .malware/ subdirectory on your PATH and drop my trojaned GnuPG in there. Once the malware