Automate decryption

Werner Koch wk at gnupg.org
Fri Aug 29 19:51:09 CEST 2008


On Fri, 29 Aug 2008 19:24, duwainer at srlcd.com said:

> It will be a server doing the work. I want it completely automated, so
> there will be no human interaction.

To avoid having your keys or a passphrase stored somewhere on the disk
you have two choices:

 1. Use gpg-agent and gpg-preset-passphrase along with a script to ask
    the operator at boot time to enter the passphrase.  That will keep
    the passphrase only in memory and thus make it a little bit harder
    for attackers to get it.  Note that gpg-preset-passphrase has a bug
    but that will be fixed soon.

 2. Use a HSM, like a smartcard to store the key and have it decrypt the
    key.  This way an attacker won't be able to get the key.

One attack you can't avoid is an attacker using your system to decrypt
files.  I doubt that this is a real threat because the attacker could
just get the plaintext after gpg decrypted it.


Shalom-Salam,

   Werner


-- 
Linux-Kongress 2008 + Hamburg + October 7-10 + www.linux-kongress.org

   Die Gedanken sind frei.  Auschnahme regelt ein Bundeschgesetz.




More information about the Gnupg-users mailing list