On 2009-04-08 00:17 +0200, H.S. wrote:

> Douglas A. Tutty wrote:
>> On Tue, Apr 07, 2009 at 05:46:31PM -0400, H.S. wrote:
>>> Douglas A. Tutty wrote:
>>>> Where does it hold the decrypted data?  Does it stay in RAM, does it get
>>>> swapped, does it go to a scratch file?
>>> This might help:
>>> http://www.easypg.org/
>> 
>> yea, it looks like it can leak info.

Note that this page actually says that easypg correctly deals with the
potential problem of leaking the passphrase.

> I am just starting to play around with the two tools (gnupg.vim and
> easypg). You appear to already know about vim and have pointed out a
> possible problem with easypg. Does this problem not exist in the vim plugin?

There are actually two problems that have to be dealt with:

- leaking out the passphrase to disk
- leaking out an unencrypted copy of the data you're editing.

Obviously, the first problem is the more severe one, and easypg avoids
it.  The second one is hard to avoid since the editor process is subject
to being swapped out to disk or leaving behind core files.  Basically 
editing sensitive data on a machine you don't control should be avoided
if possible.

Note that both easypg and gnupg.vim avoid leaking unencrypted data to
disk files (easypg disables auto-saving, gnupg.vim the swapfile).

Sven


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to