[prev in list] [next in list] [prev in thread] [next in thread] 

List:       gnupg-users
Subject:    Re: invalid gpg key revocation
From:       Daniel Kahn Gillmor <dkg () fifthhorseman ! net>
Date:       2012-03-05 23:23:38
Message-ID: 4F554AFA.5010106 () fifthhorseman ! net
[Download RAW message or body]

On 03/05/2012 04:36 PM, Ingo Klöcker wrote:

> 4. He has left his laptop unlocked and unattended for a very short 
> period of time and he is using gpg-agent with a cache-ttl > 0.
> 
> I have verified that one can generate a revocation certificate without 
> entering a passphrase if one has previously signed something (e.g. an 
> email). So, it was probably just a very nasty prank.

as pranks involving compromise of the secret key go, this is the
least-nasty prank i can think of.

> Maybe gpg shouldn't use the cached signing passphrase (or any cached 
> passphrase) for generating a revocation certificate.

But it's ok to use the cached signing passphrase for making bogus
identity certifications?  For signing ersatz love letters?

What's to stop the malefactor from just querying the passphrase directly
out of gpg-agent and absconding with both it and the secret key material
to do whatever they want later?

I don't think making the proposed limitation is a helpful one.

	--dkg

_______________________________________________
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic