Hi Sämi,

> Some weeks ago I found on debian-security [1] the following script:
>
> #!/bin/sh
> gpg keys.gpg > /dev/null
> emacs keys
> rm keys.gpg
> gpg -r "user-ID" -e keys
> rm keys
>
> What do you guys think is this approach reasonably secure? I like
> the script above because it is rather simple.
Well - the question is of course: What do you understand by "reasonably
secure" ;-) In fact, I see one really weak point in this approach:
Whenever you read / write the file, you create a un-encrypted copy which
is stored on the disk. later, you only delete it by "rm" - you don't
"zero-out" the bytes: The file is no longer accessible by the
filesystem, but there is a high probability that it is possible to
re-create the deleted file by analyzing the free sectors of your file
system (especially, as you create an new unencrypted copy whenever you
start this script).

And of course: while you are reading the file, it is stored unencrypted
on your disk - you shouldn't use this script on a multi-user machine (or
on a machine where automatic backups can happen while you are editting
this file - thus the un-encrypted copy is included into the backup).

A much safer approach (using vim instead of emacs) is e.g described  in 
http://www.debian.org/doc/manuals/reference/ch-gnupg.en.html, 14.4.2:
In this way, the clear-text version is never stored on the hard-disk,
but only kept in memory while you are editing the file.

In addition - it is more comfortable: you just have to open the file in
vim, and it will be automatically decrypted...

I'm sure for emacs exists an analogous approach (if you prefer emacs to
vim)


HTH,

Axel


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to