BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Sharing gnupg keyring among computers
- Subject: [Discuss] Sharing gnupg keyring among computers
- From: richard.pieri at gmail.com (Richard Pieri)
- Date: Mon, 25 Sep 2017 21:00:04 -0400
- In-reply-to: <20170925195717.GH23814@angus.ind.wpi.edu>
- References: <CAEvgogHMsuciQxZZ-cFtP2v9Qs6xbXYdm2wDy9zQ1EOWPS34TA@mail.gmail.com> <CAEvgogE-YAJUC0TD0tcxnp1f+puSax6Fo7U1pWT+NOiZJhNVBA@mail.gmail.com> <CAEvgogFJd9GoLxHQ4wmRu3EJP8OwggwWFyKhSDVHyRZjiGOYnQ@mail.gmail.com> <CAEvgogExsBoxr-kJuTAOQegrcVbP4KxY12rohKDPpPay2iva=w@mail.gmail.com> <CAEvgogHWjLTXJC8VA4eimL9tLq3kyLtktho2Ai0xvP4y7P1Etw@mail.gmail.com> <CAEvgogF_MSpswvJPfG_Kse+QcfkBnh=7ViMb2gRwBnRmK4_03g@mail.gmail.com> <CAEvgogF2ybMg-L098iL8e3Qp6wSvBhtOTMF09bAOdo7qyPDKtA@mail.gmail.com> <CAEvgogGQRubn39VGTDQog6JyUcjbmsww+46PNzfOvV_0BbqXsg@mail.gmail.com> <20170925133058.GG13169@angus.ind.wpi.edu> <31235c6b-6d16-ca42-c0ef-5ca131630f32@gmail.com> <20170925195717.GH23814@angus.ind.wpi.edu>
On 9/25/2017 3:57 PM, Chuck Anderson wrote: > YubiKey isn't simply a writable USB mass storage device. It is > purpose-designed to store secrets securely. They also make a NFC > version. It's purpose-designed to store secrets separately from the computers using them except for when they are being used. It's an important distinction. The secrets stored on a YubiKey can be extracted verbatim by any program on a computer with a YubiKey plugged into it. Regardless, the fact that they are writable makes them a potential vehicle for distributing malware. Which to me means that the only places I will use USB fobs like this is on computers owned by the fob issuers for the purpose of issuer-related tasks which require the fobs. Because... > If you don't trust the computer you are typing into, they none of > what we are discussing can help. More generally: If the computer is not compromised then the YubiKey adds nothing to the security of the system. It just makes the system more inconvenient to use. If the computer is compromised then the bad actor can pull the keys out of memory after they're loaded from the YubiKey. Either way the YubiKey provides no practical security in this regard. GnuPG version 2 itself does things to make extracting keys from RAM difficult but difficult != impossible. NB: this is using a YubiKey as an OpenPGP smartcard. Using a YubiKey as part of an n-factor or n-step authentication system is a different kettle of fish. -- Rich P.
- References:
- [Discuss] Sharing gnupg keyring among computers
- From: gaf.linux at gmail.com (Jerry Feldman)
- [Discuss] Sharing gnupg keyring among computers
- From: cra at WPI.EDU (Chuck Anderson)
- [Discuss] Sharing gnupg keyring among computers
- From: richard.pieri at gmail.com (Richard Pieri)
- [Discuss] Sharing gnupg keyring among computers
- From: cra at WPI.EDU (Chuck Anderson)
- [Discuss] Sharing gnupg keyring among computers
- Prev by Date: [Discuss] Sharing gnupg keyring among computers
- Next by Date: [Discuss] Secure Wireless Router for Non-Profit
- Previous by thread: [Discuss] Sharing gnupg keyring among computers
- Next by thread: [Discuss] Reviving topic-Secure Wireless Router
- Index(es):