And here it is:

https://github.com/ms140569/loki/releases/tag/1.2.0

Thanks to your guy's input the key-agent should be now way more secure.

cheers,

Matthias

Am Dienstag, 16. Oktober 2018 20:31:42 UTC+2 schrieb Matthias Schmidt:
>
> Hi Christopher + Eric,
>
> thanks for your feedback. You are right, i really underestimated the risk 
> of such attacks.
>
> I will lock the key-holding memory in the next release.
>
> cheers,
>
> Matthias
>
>
> Am Montag, 15. Oktober 2018 23:13:32 UTC+2 schrieb Christopher Nielsen:
>>
>> On Mon, Oct 15, 2018 at 1:28 PM Matthias Schmidt 
>> <matthias...@gmail.com> wrote: 
>> > 
>> > Hi Eric, 
>> > 
>> > thanks *a lot* for your valuable feedback! I really appreciate it. See 
>> comments inline: 
>> > 
>> > Am Montag, 15. Oktober 2018 12:09:32 UTC+2 schrieb EricR: 
>> >> 
>> >> Since you're looking for opinions on the security concept, two 
>> questions spring immediately to my mind: 
>> >> 
>> >> 1. Does the daemon keep the sensitive data in locked memory that 
>> cannot be paged out? If so, how cross-platform is this? 
>> > 
>> > 
>> > No it doesn't. As of now i consider the root-user a good guy ;-) 
>> > He's the only one who could access the pagefiles anyway. 
>> > 
>> > So is this really an issue? If yes i could use this cross-platform 
>> solution to pin the key: 
>> > 
>> > https://github.com/awnumar/memguard 
>> > 
>> > 
>> >> 
>> >> 
>> >> 2. How does the client communicate securely with the daemon? Which 
>> encryption protocol/handshake is used for this? (If it just uses a socket, 
>> what would prevent another process from reading out the master password?) 
>> > 
>> > 
>> > It's in fact a unix domain socket file which is only accessible for the 
>> owner of the key. ( Thanks for bringing this up, i forgot to flag the file 
>> correctly - it's now fixed). 
>> > Relying on the file permissions in unix shouldn't be a problem, right? 
>> > 
>> > cheers & again - many thanks, 
>> > 
>> > Matthias 
>>
>> You seem to be putting a lot of trust in facilities that are trivially 
>> exploitable to a determined attacker. For software like a password 
>> manager, assuming the kernel is secure is a poor security model. In 
>> addition to the existing attack surface, we live in a world where 
>> side-channel attacks are becoming more common, e.g., Spectre and 
>> Meltdown, so it isn't safe to assume the kernel or hardware are 
>> secure. A password manager needs to have a robust security model that 
>> has a minimal trust model if it is to be more than a toy. 
>>
>> Just my $0.02 
>>
>> -- 
>> Christopher Nielsen 
>> "They who can give up essential liberty for temporary safety, deserve 
>> neither liberty nor safety." --Benjamin Franklin 
>> "The tree of liberty must be refreshed from time to time with the 
>> blood of patriots & tyrants." --Thomas Jefferson 
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to