[gnutls-help] Creating password protected private keys with certtool?

Daniel Kahn Gillmor dkg at fifthhorseman.net
Fri May 16 15:31:18 CEST 2014


On 05/15/2014 06:22 AM, Josef Wolf wrote:
> Nikos, I'm not really sure whether this is a good idea. After all, insisting
> on regular files prevents against symlink attacks.

can you describe what symlink attack you're concerned about in the
context of reading a password from a file?

If the attacker is in control of the certtool invocation, they can
already specify an arbitrary file.  If the attacker is *not* in control
of the invocation, then the user should be able to responsibly choose
the file that they're interested in without certtool risking opening the
wrong one.  So i don't see how a symlink attack works in this context.
 Can you explain?

	--dkg

PS i also like the idea of being able to set it to a fifo, so that a
wrapper script around certtool can set up a program that feeds its input
to the fifo and the password never hits the disk.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 1010 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20140516/3ac81a88/attachment-0001.sig>


More information about the Gnutls-help mailing list