On Thu, Jan 28, 2016 at 3:30 PM George Barrett <b...@bob131.so> wrote:
[snip]

> As far as such things being within gnome-keyring's purview, there are
> pages on the (still outdated) wiki specifically stating that these are
> out of scope[4][5].
>
[snip]

Thanks for the links. They were helpful. I didn't see anything specifically
stating those things are "out of scope"... just that they might depend on
changes elsewhere to be properly hardened (vs. "security theater").

To give context, reference [5] highlights my primary concern when it says
"Passwords in an unlocked keyring being read by a malicious application
that is running on the user's desktop. "

The gpg-agent provided by seahorse-plugins in the past used to mitigate
this somewhat, by notifying upon cache access, and by providing a cache
timeout, and approval option. So, to some extent, I think the recent
feature set has taken a step back from that user interactivity. I'd like to
see those kinds of features reintroduced, but applied to all credentials,
not just cached GPG keys.

I have no illusions that such features would provide perfect security, but
I think they could go a long way towards mitigating the risk of "Passwords
in an unlocked keyring being read by a malicious application that is
running on the user's desktop.", especially when the default is most (if
not all distros) is to typically leave a logon keyring in an unlocked state.


> [5]:
>
> https://wiki.gnome.org/Projects/GnomeKeyring/SecurityFAQ#What_types_of_attacks_are_still_possible.3F
>
> [snip]
_______________________________________________
gnome-keyring-list mailing list
gnome-keyring-list@gnome.org
https://mail.gnome.org/mailman/listinfo/gnome-keyring-list

Reply via email to