To clarify, this is for a hardware device that protects a local resource - a network based protocol that challenges the device for access is a different story, and yes, when properly implemented is secure (unless someone steals your device! - which is why it is usually password + device, and then you are back to the same problem of compromising passwords when root access has been compromised).
> On Oct 15, 2018, at 6:25 PM, robert engels <reng...@ix.netcom.com> wrote: > > Maybe, but still, if they have root access to your machine, they can just as > easily alter the accessing binary to send the decoded password elsewhere > after it has decoded it… > > Which is why applications on osx are “signed” (to prohibit tampering) > (although if you have root access - you could probably also add the bogus > singing cert to the certificate store). As far as I know Linux and its > variants don’t enforced signed binaries. > > I only point this out because you give the impression that because you “use a > hardware device” it is secure - this is not really the case. > > Security is always a trade-off. > >> On Oct 15, 2018, at 6:04 PM, Christopher Nielsen <m4dh4t...@gmail.com> wrote: >> >> On Mon, Oct 15, 2018 at 3:10 PM robert engels <reng...@ix.netcom.com> wrote: >>> >>> Exactly - and systems do not typically have this - yet are considered >>> secure. If the plain text is ever available - and it almost always is (in >>> the original input component, etc.) it is always subject to attack/hack - >>> and as far as I am aware without hardware support (dongle, etc.) this is a >>> limitation of all security implementations. >> >> Considered secure by whom? Maybe "secure enough" by most. At the end >> of the day, you have to look at your threat model, attack surface, >> potential attackers, and value of what you want to protect. A password >> manager is a high-value target for obvious reasons. It should have a >> well-defined and vetted security model. Personally, I use a hardware >> security token to secure mine because I don't trust software. >> >>> You don’t always need the plain text though, you can store the one way hash >>> (as in Http Digest security), and use that, so if the store is compromised >>> the users known passwords are not discovered - but it doesn’t mean access >>> won’t be granted. >> >> Sure. It depends what you're doing, of course. >> >>> As far as I know - even ‘keychain access’ in osx (used in millions of >>> systems) would be subject to similar hack to if root was available and >>> memory could be scanned. >> >> It does not follow that because something is used by millions that it >> is secure. Again, maybe "secure enough" for most. I also use a >> hardware token with keychain. >> >> We seem to have wandered pretty far afield of the topic of this forum. >> >> -- >> Christopher Nielsen >> "They who can give up essential liberty for temporary safety, deserve >> neither liberty nor safety." --Benjamin Franklin >> "The tree of liberty must be refreshed from time to time with the >> blood of patriots & tyrants." --Thomas Jefferson >> >> -- >> You received this message because you are subscribed to the Google Groups >> "golang-nuts" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to golang-nuts+unsubscr...@googlegroups.com. >> For more options, visit https://groups.google.com/d/optout. > > -- > You received this message because you are subscribed to the Google Groups > "golang-nuts" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to golang-nuts+unsubscr...@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. -- You received this message because you are subscribed to the Google Groups "golang-nuts" group. To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.