Archive of RubyForge sup-talk mailing list
 help / color / mirror / Atom feed
* [sup-talk] Encrypted password in configuration file
@ 2009-08-24 20:54 Lars Kotthoff
  2009-08-28  2:37 ` Jim Cheetham
                   ` (2 more replies)
  0 siblings, 3 replies; 7+ messages in thread
From: Lars Kotthoff @ 2009-08-24 20:54 UTC (permalink / raw)


Hi list,

 is it possible to store the account password encrypted in the configuration
file?

Thanks,

Lars


^ permalink raw reply	[flat|nested] 7+ messages in thread

* [sup-talk] Encrypted password in configuration file
  2009-08-24 20:54 [sup-talk] Encrypted password in configuration file Lars Kotthoff
@ 2009-08-28  2:37 ` Jim Cheetham
       [not found]   ` <20090828012502.15484x8musndy5mo@webmail.seas.upenn.edu>
  2009-08-28  7:23   ` Lars Kotthoff
  2009-08-28 20:29 ` William Morgan
  2009-08-28 22:48 ` Mike Kelly
  2 siblings, 2 replies; 7+ messages in thread
From: Jim Cheetham @ 2009-08-28  2:37 UTC (permalink / raw)


On Tue, Aug 25, 2009 at 8:54 AM, Lars Kotthoff<lists at larsko.org> wrote:
> Hi list,
>
> ?is it possible to store the account password encrypted in the configuration
> file?

It's possible, but slightly pointless.

Have a read of Eric Raymond's discussions about Fetchmail, which has
the same configuration data :-
http://www.catb.org/~esr/writings/cathedral-bazaar/cathedral-bazaar/ar01s09.html

"Another lesson is about security by obscurity. Some fetchmail users
asked me to change the software to store passwords encrypted in the rc
file, so snoopers wouldn't be able to casually see them.

I didn't do it, because this doesn't actually add protection. Anyone
who's acquired permissions to read your rc file will be able to run
fetchmail as you anyway?and if it's your password they're after,
they'd be able to rip the necessary decoder out of the fetchmail code
itself to get it.

All .fetchmailrc password encryption would have done is give a false
sense of security to people who don't think very hard. The general
rule here is:

    17. A security system is only as secure as its secret. Beware of
pseudo-secrets."

-jim


^ permalink raw reply	[flat|nested] 7+ messages in thread

* [sup-talk] Encrypted password in configuration file
       [not found]   ` <20090828012502.15484x8musndy5mo@webmail.seas.upenn.edu>
@ 2009-08-28  7:07     ` Jim Cheetham
  0 siblings, 0 replies; 7+ messages in thread
From: Jim Cheetham @ 2009-08-28  7:07 UTC (permalink / raw)


On Fri, Aug 28, 2009 at 5:25 PM, <wagnerdm at seas.upenn.edu> wrote:
> I can imagine all kinds of situations with "benevolent" attackers. ?For
> example, what about a girlfriend that pokes around your hard drive looking
> for lolcats when she's bored? ?One glance at .fetchmailrc would show it's
> not a lolcat; but that same glance could show a password that you don't
> really want her to know.

It took over 7 years before I would even tell my wife my login
password; I've since changed it and won't share it. And I trust her
implicitly with my machine -- there is nothing on there that I'm not
happy for her to see :-)

So, how does the putative bored girlfriend poke around your hard-drive
in the first place, in this scenario? If you are letting her use your
account and poke around your machine in the first place, how does her
seeing a password cause a problem?

If you don't want someone to know something, don't put them is a
situation where they might find it. You shouldn't expect a program to
employ a pointless encryption/obscuration scheme just because you
don't look after your other data. You are increasing the complexity of
the code, increasing the complexity of the testing environment,
increasing the opportunity for bugs to occur (possibly causing data
loss?), and protecting against nothing.

Now, there is an approach used by mutt that sup doesn't seem to use,
which is to prompt the user at the beginning of a session for the
various source passwords; this way they are only held in memory (and
swap files, probably). That may be a way out of the situation; as a
mail client is inherently an interactive program, there's no harm in
prompting for things missing from the config, I think.

-jim


^ permalink raw reply	[flat|nested] 7+ messages in thread

* [sup-talk] Encrypted password in configuration file
  2009-08-28  2:37 ` Jim Cheetham
       [not found]   ` <20090828012502.15484x8musndy5mo@webmail.seas.upenn.edu>
@ 2009-08-28  7:23   ` Lars Kotthoff
  2009-08-28  9:28     ` Jim Cheetham
  1 sibling, 1 reply; 7+ messages in thread
From: Lars Kotthoff @ 2009-08-28  7:23 UTC (permalink / raw)


> It's possible, but slightly pointless.

Not if the user supplies the passphrase, e.g. it could be encrypted with the
user's GPG key and ask for the passphrase at startup.

Lars


^ permalink raw reply	[flat|nested] 7+ messages in thread

* [sup-talk] Encrypted password in configuration file
  2009-08-28  7:23   ` Lars Kotthoff
@ 2009-08-28  9:28     ` Jim Cheetham
  0 siblings, 0 replies; 7+ messages in thread
From: Jim Cheetham @ 2009-08-28  9:28 UTC (permalink / raw)


On Fri, Aug 28, 2009 at 7:23 PM, Lars Kotthoff<lars at larsko.org> wrote:
>> It's possible, but slightly pointless.
>
> Not if the user supplies the passphrase, e.g. it could be encrypted with the
> user's GPG key and ask for the passphrase at startup.

Why not just ask for the IMAP password itself? There's no functional
difference between that secret, and the secret that unlocks the secret
... indeed, if sup were to accidentally expose the passphrase you
provided, would you rather lose your GPG key or your IMAP key?

If you are really determined to allow others to read your private
files, why not just encrypt the whole .sup directory with a separate
tool (TrueCrypt, loopback, rot13, encfs, ecryptfs, or whatever else
your distribution provides).

That way, you are also protecting the ferret index collection, and the
default sent box, which all contain data of the same level of
sensitivity as your mailbox. Given your concern, I assume that you
will be remembering to terminate sup and dismount the .sup directory
every time you walk away from the keyboard.

(Many schemes these days encrypt the whole of $HOME, which makes the
whole screensaver/away from the keyboard thing even more difficult).

Security must be appropriate to be actual security. Otherwise it's
just an expensive fa?ade.

-jim


^ permalink raw reply	[flat|nested] 7+ messages in thread

* [sup-talk] Encrypted password in configuration file
  2009-08-24 20:54 [sup-talk] Encrypted password in configuration file Lars Kotthoff
  2009-08-28  2:37 ` Jim Cheetham
@ 2009-08-28 20:29 ` William Morgan
  2009-08-28 22:48 ` Mike Kelly
  2 siblings, 0 replies; 7+ messages in thread
From: William Morgan @ 2009-08-28 20:29 UTC (permalink / raw)


Reformatted excerpts from Lars Kotthoff's message of 2009-08-24:
> is it possible to store the account password encrypted in the
> configuration file?

Despite generally agreeing with Jim's argument, I'm happy to accept a
patch to do this.
-- 
William <wmorgan-sup at masanjin.net>


^ permalink raw reply	[flat|nested] 7+ messages in thread

* [sup-talk] Encrypted password in configuration file
  2009-08-24 20:54 [sup-talk] Encrypted password in configuration file Lars Kotthoff
  2009-08-28  2:37 ` Jim Cheetham
  2009-08-28 20:29 ` William Morgan
@ 2009-08-28 22:48 ` Mike Kelly
  2 siblings, 0 replies; 7+ messages in thread
From: Mike Kelly @ 2009-08-28 22:48 UTC (permalink / raw)


On Mon, 24 Aug 2009 21:54:35 +0100
Lars Kotthoff <lists at larsko.org> wrote:
>  is it possible to store the account password encrypted in the
> configuration file?

Along the lines of what Jim said, doing any sort of two-way encryption
on the password is a wasted effort. There are other sort of
authentication mechanisms which are probably more appropriate
(certificate-based, Kerberos/GSSAPI, ...).

-- 
Mike Kelly


^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2009-08-28 22:48 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2009-08-24 20:54 [sup-talk] Encrypted password in configuration file Lars Kotthoff
2009-08-28  2:37 ` Jim Cheetham
     [not found]   ` <20090828012502.15484x8musndy5mo@webmail.seas.upenn.edu>
2009-08-28  7:07     ` Jim Cheetham
2009-08-28  7:23   ` Lars Kotthoff
2009-08-28  9:28     ` Jim Cheetham
2009-08-28 20:29 ` William Morgan
2009-08-28 22:48 ` Mike Kelly

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox