On 27.04.2013 06:45, Stephen J. Turnbull wrote:

>  > 2. Your list has elevated security requirements. In this case, you can
>  > use gpg-agent to manage the secret key (and its passphrase).
> 
> I don't understand what threat you propose to address in this way.
> It's true that you can prevent the attacker from getting access to the
> key (using agent forwarding or a token, it need not be on the exposed
> host at all), but we're assuming he has access to the host and the
> Mailman process.

The gpg-agent approach protects you from all storage-related attacks:
- unencrypted backups
- physical access to the harddrive
- etc.

It does not protect from attackers who have access to the contents of
the computer's RAM:
- raw memory access and scanning for the secret key (requires root)
- memory dump via DMA-enabled interfaces (firewire, pc-card, ...)
- cold boot attacks


Stefan.
_______________________________________________
Mailman-Developers mailing list
Mailman-Developers@python.org
http://mail.python.org/mailman/listinfo/mailman-developers
Mailman FAQ: http://wiki.list.org/x/AgA3
Searchable Archives: 
http://www.mail-archive.com/mailman-developers%40python.org/
Unsubscribe: 
http://mail.python.org/mailman/options/mailman-developers/archive%40jab.org

Security Policy: http://wiki.list.org/x/QIA9

Reply via email to