1 |
Jorge Aleida wrote |
2 |
> >Technically this is incorrect, anyone that can read and write to this |
3 |
> >socket can authenticate using the keys, but they can't read the key |
4 |
> >material directly. They can also engage in a known-plaintext or |
5 |
> |
6 |
> OK, that's what I thought. But a troian running with the normal user |
7 |
> permissions could get the keys by reading the temporary directory (not |
8 |
> by connecting to the socket). Is this right? Or are the keys protected |
9 |
> in some other way? For example, keys might be kept encrypted and then |
10 |
> decrypted on demand using the passphrase provided when the key was |
11 |
> added, assuming the passphrase was kept on protected memory. |
12 |
|
13 |
That's why some people build public keys as root on a desktop but try |
14 |
to do everything else like browsing or reading mail as user. |
15 |
|
16 |
|
17 |
ralf |
18 |
|
19 |
-- |
20 |
gentoo-user@g.o mailing list |