On 7/12/25 17:41, Robert J. Hansen wrote:
Either you plan much farther ahead than the common cybercrook or we are talking about targeted attacks instead of the much common "spam" attacks.  (That said, GnuPG is *supposed* to stand up against targeted attacks.)

Correct, I'm talking about targeted attacks. Random drive-bys are not of much personal or professional concern. This is of course my risk model, and I don't expect it to be relevant to anyone else. :)

Both *should* be of concern, since a targeted attacker could certainly use "drive-by" techniques, both to evade detection and possibly your defenses, if you are so focused on targeted attacks that you miss something.

The catch is that the "juicy" stuff is typically *in* the user's account on a single-user box... and therefore accessible without elevation if Mallory is hitting the client.

If it's a single-user box, sure. Of course, many single-user boxes make privilege escalation ridiculously easy, so why not? (Everyone who has put NOPASSWD: ALL into their sudoers file, please raise your hands...)

I just checked to make sure that is *not* in there...  (I would not be surprised to find that some distributions have it by default...)

Why risk the exposure (and correction) of a privilege escalation exploit when everything Mallory wants is right there without it?

Because even on single-user boxes, persistence and cleaning up one's tracks is much easier done with escalation than without. If persistence and concealment is part of the attack profile, you need escalation.

In my model, Mallory's ideal goal is make off with your data and/or private keys and/or an unauthorized signature without leaving a trace aside from possible intentional tampering.

Then Mallory needs escalation. If you're going to do things like look through the system logs and scrub them appropriately, you need to escalate.

This is why I believe a competent Mallory always escalates. It's simply not possible to do a thorough cleanup job without escalation.
If Mallory only wants a smash-and-grab, then persistence is a needless risk.  Client exploits typically do *not* produce log entries in the first place, so there is nothing to clean up.

In fact, log scrubbing might *be* an indicator of an intrusion: you full well that your browser crashed with SIGSEGV, where the hell is the segfault in the log?

In that environment, a smartcard is not sufficient; you need an isolated box.

Frankly, I think you need a lot more than a smartcard, too, starting with a radical rethink of "why am I hosting such valuable files on a machine connected to the internet?"  :)

Consider the scenario of software release signing keys. Obviously the signature must reach a network-connected machine in order to publish it.  Mallory wants to sign a Trojan horse with your key.  You want to prevent that, or at least detect the intrusion immediately and announce that a spurious signature exists before Mallory can smear your good name.


-- Jacob


_______________________________________________
Gnupg-devel mailing list
[email protected]
https://lists.gnupg.org/mailman/listinfo/gnupg-devel

Reply via email to