Matt:
> I don't have any thoughts on the pam module, but I make use of some
> scripts that rely on pass as well.  For my use case I just raised the
> TTL setting of gpg-agent to match an eight hour work day or eight hour
> evening period and ran with it.  Feels fairly natural to "log in" to
> the agent once a day at the first use.

Doesn't this sort of defeat the purpose of using pass? I mean if it's
always decryptable then is it really useful to have it encrypted in the
first place (assuming you have full disk encryption set up)? I may be
missing something crucial here so please let me know.

Grant:
> Can you re-architect this as a (pseudo) daemon so that you unlock it 
> once (or at least a LOT less often) and it stores the necessary 
> information in memory for subsequent re-use?

This seems like the lesser of all evils to me. As I understand, you're
suggesting that I lend the email password to the daemon at start and
only have that password stored in memory instead of my actual gpg
password, is that correct?

> Could you re-configure things so that (a copy of) the requisite password 
> is accessible via a different set of GPG credentials specific to the 
> process that you're running?  Then you could probably have just that set 
> of GPG credentials unprotected so that the script could use them as it 
> is today.

Again, I may be missing something here, but does having your GPG
credentials unprotected offer any real protection?

> If neither of these options were possible I'd look into something like a 
> TPM and / or Yubikey wherein I could offload some of the GPG to it so 
> that the decryption key is physically tied to the source computer /and/ 
> *where* *it* *can't* *be* *copied*.

I guess this is where I'll eventually be heading towards. 

By the way, thanks to both of you for your thoughts!

-- 
All the best,
Efe

The funny quote of this email is trivial and left as an exercise.

Attachment: signature.asc
Description: PGP signature

Reply via email to