On Sun, Jul 15, 2018 at 11:31 AM Philipp Kern <pk...@debian.org> wrote:

> On 15.07.2018 10:42, Dashamir Hoxha wrote:
> > Description:
> >   A simple command-line password manager that keeps passwords inside a
> >   gpg encrypted tgz archive. The content of the archive is a directory
> tree
> >   with a file for each password entry. The first line of the file is the
> >   password, and the rest can optionally be additional or related info.
> >   It provides commands for manipulating the passwords, allowing the user
> >   to add, remove, edit, generate passwords etc.
> >
> > Repository: https://github.com/dashohoxha/pw
> > Documentation: http://dashohoxha.github.io/pw/man/
> >
> > This program started by forking 'pass': http://www.passwordstore.org/
> > I sugessted a few changes to it, which were not accepted, so I forked
> > it and made further changes and improvements, until it became a
> > completely different program.
> > See:
> > -
> https://lists.zx2c4.com/pipermail/password-store/2016-January/001887.html
> > -
> https://lists.zx2c4.com/pipermail/password-store/2016-January/001902.html
> > -
> https://lists.zx2c4.com/pipermail/password-store/2016-January/001928.html
>
> I have to say that I'm pretty unconvinced of this code.
>
> * The archive is temporarily stored unencrypted on disk: encrypt and
> decrypt do an in-place operation with gpg, which is done wherever the
> encrypted archive lives. So tar stores onto disk into the target path,
> then the result is encrypted with gpg and the original is erased using
> rm -rf (also ignoring errors in case the file fails to delete). The
> inverse happens for decryption.
> * Symmetric and asymmetric encryption are not actually exclusive as the
> author makes it sound on the mailing list thread as gpg can wrap the
> session key with both symmetric and asymmetric keys.
> * Error handling in the script is wonky. I wonder if we could end up
> with an actual "rm -rf /" in case mktemp for WORKDIR fails. Errors on
> untar and tar are suppressed...
> * Comments like [0] aren't exactly inspiring either. The quoting in the
> script is "interesting". Sure, maybe you're asking for trouble anyway if
> your home directory contains a space, but this script will break in
> interesting ways. :)
>

All your assertions/assumptions are wrong.
Either you did not look close enough to the code, or you are not
an expert on bash scripting (bash is a bit cryptic and difficult
to understand even for experts).

I did not look at the original code of pass, but I don't find this code
> handling secrets confidence inspiring, to be honest.
>

Instead of basing your judgment on general opinions, why don't you
try to find any particular situation that will break the script in some
interesting way ;) This is called proof by counter-example.
If you cannot do this, and if nobody else can do this, then you cannot
claim that it is not safe to use this script.

Best regards,
Dashamir Hoxha


>
> Kind regards
> Philipp Kern
>
> [0]
> https://lists.zx2c4.com/pipermail/password-store/2016-January/001932.html
>

Reply via email to