On Fri, 1 Dec 2023, [email protected] wrote:

I will say one thing about the method Carlos posted to remove the password file. I was aware of this, and I have seen posts like this in the past. Alpine has the ability to remove this password too, and I have posted in the past how to do this. This means, there are two ways to remove the password from the encryption key, and I will modify Alpine to force everyone to have a password in the encryption key.

Can I ask what the specific threat model is that this step is meant to combat?

If I understand correctly, the threat is that a rogue
web script can upload the password file and decrypt it at
leisure.

An attacker with local root doesn't need to care about any disk encryption; he can read your decrypted master key and the plaintext of your IMAP passwords directly from memory. And of course a local attacker who doesn't have root can be guarded against simply with filesystem permissions.

For a remote attacker that has gained shell-level access to
the user account, uploading a file is easier than finding
the password in the memory of a running process
 - and that only works if alpine is currently running.

--
Andrew C. Aitchison                      Kendal, UK
                   [email protected]
_______________________________________________
Alpine-info mailing list
[email protected]
http://mailman12.u.washington.edu/mailman/listinfo/alpine-info

Reply via email to