We certainly want to do something better than passfile for UNIX. The passfile was a hack for the old 640K DOS-based PC Pine. It was never intended for UNIX Pine.

Passfile is abolished in the latest Windows PC Alpine; we now use Microsoft's Wincred. Similarly, Alpine uses the keyring on Mac OS X.

I can't understand how anyone could seriously advocate having passfile enabled in any UNIX-type distribution. If we did such a thing, we'd be flamed to a crisp for being "insecure by design". We see Microsoft regularly roasted in slashdot over far more minor security issues. IMHO, we're lucky that we never got burned over the PC Pine passfile.

Anyway, it would help in these discussions to have more light, and less heat. We don't need to be cajoled (or threatened) into doing something better. The only issue is in determining what that "something better" is.

With that in mind:

On Sun, 18 Feb 2007, Kolbjørn Barmen wrote:
Please.. PGP/gnupg - for signing, encryption and decryption of mail
so why not also for encryption of the password file?

To help my understanding:

How would Alpine access the decryption key in this case?

If it's stored on in a file in the user's directory, then we're back to square one. The bad guy has to steal two files instead of one; but basically this is just "security through obscurity".

How do you prevent some non-Alpine program from accessing this data? A claimed benefit of keyring type systems is that the keyring system locks out other applications from accessing that data (I don't know how true this claim is though).

If the user enters the decryption key when he runs Alpine, doesn't that defeat the purpose of the passfile? I can see the benefit when there are multiple passwords for multiple servers; in this case, one password unlocks a "password vault" that Alpine can then use for the rest of the session. But that doesn't help the typical user who just has one password that Alpine needs to use.

Are you thinking about something like a biometric key; e.g., the user swipes his finger over a fingerprint scanner and that unlocks the password vault?

If you're doing this on a site basis, wouldn't Kerberos end up being easier?

-- Mark --

http://staff.washington.edu/mrc
Science does not emerge from voting, party politics, or public debate.
Si vis pacem, para bellum.

Reply via email to