[Discuss] Sharing gnupg keyring among computers

Richard Pieri richard.pieri at gmail.com
Mon Sep 25 21:00:04 EDT 2017


On 9/25/2017 3:57 PM, Chuck Anderson wrote:
> YubiKey isn't simply a writable USB mass storage device.  It is
> purpose-designed to store secrets securely.  They also make a NFC
> version.

It's purpose-designed to store secrets separately from the computers
using them except for when they are being used. It's an important
distinction. The secrets stored on a YubiKey can be extracted verbatim
by any program on a computer with a YubiKey plugged into it.

Regardless, the fact that they are writable makes them a potential
vehicle for distributing malware. Which to me means that the only places
I will use USB fobs like this is on computers owned by the fob issuers
for the purpose of issuer-related tasks which require the fobs.

Because...

> If you don't trust the computer you are typing into, they none of 
> what we are discussing can help.

More generally:

If the computer is not compromised then the YubiKey adds nothing to the
security of the system. It just makes the system more inconvenient to
use. If the computer is compromised then the bad actor can pull the keys
out of memory after they're loaded from the YubiKey. Either way the
YubiKey provides no practical security in this regard. GnuPG version 2
itself does things to make extracting keys from RAM difficult but
difficult != impossible.

NB: this is using a YubiKey as an OpenPGP smartcard. Using a YubiKey as
part of an n-factor or n-step authentication system is a different
kettle of fish.

-- 
Rich P.



More information about the Discuss mailing list