[gnutls-help] Creating password protected private keys with certtool?
Daniel Kahn Gillmor
dkg at fifthhorseman.net
Fri May 16 15:31:18 CEST 2014
On 05/15/2014 06:22 AM, Josef Wolf wrote:
> Nikos, I'm not really sure whether this is a good idea. After all, insisting
> on regular files prevents against symlink attacks.
can you describe what symlink attack you're concerned about in the
context of reading a password from a file?
If the attacker is in control of the certtool invocation, they can
already specify an arbitrary file. If the attacker is *not* in control
of the invocation, then the user should be able to responsibly choose
the file that they're interested in without certtool risking opening the
wrong one. So i don't see how a symlink attack works in this context.
Can you explain?
--dkg
PS i also like the idea of being able to set it to a fifo, so that a
wrapper script around certtool can set up a program that feeds its input
to the fifo and the password never hits the disk.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1010 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20140516/3ac81a88/attachment-0001.sig>
More information about the Gnutls-help
mailing list