Gentoo Archives: gentoo-user

From: Ralf Stephan <ralf@×××××××××××××.de>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] ssh-agent
Date: Tue, 21 Nov 2006 17:19:12
Message-Id: 20061121170036.GA21535@ark.in-berlin.de
In Reply to: Re: [gentoo-user] ssh-agent by Jorge Almeida
1 Jorge Aleida wrote
2 > >Technically this is incorrect, anyone that can read and write to this
3 > >socket can authenticate using the keys, but they can't read the key
4 > >material directly. They can also engage in a known-plaintext or
5 >
6 > OK, that's what I thought. But a troian running with the normal user
7 > permissions could get the keys by reading the temporary directory (not
8 > by connecting to the socket). Is this right? Or are the keys protected
9 > in some other way? For example, keys might be kept encrypted and then
10 > decrypted on demand using the passphrase provided when the key was
11 > added, assuming the passphrase was kept on protected memory.
12
13 That's why some people build public keys as root on a desktop but try
14 to do everything else like browsing or reading mail as user.
15
16
17 ralf
18
19 --
20 gentoo-user@g.o mailing list