gnome-keyring stores your passwords on disk, encrypted with a single
passphrase.  You make the phrase on creation and re-enter it again later
to open the ring.  The additional challenge is that nobody should be
able to recover the data without also knowing the passphrase.  So the
datastore itself has to be imbued with mathematical properties related
to the passphrase, and the passphrase change (unless you also have the
old passphrase).

Fingerprint identification works by doing a fuzzy match of a given scan
to a registered print. These fuzzy match algorithms are even subject to
export controls (normally).  Any given scan will be different, as your
fingerprint changes over time.  Scars, wounds, warts, orientation etc
can affect the scan.  So the given scan can't be an encryption key,
because every scan is different and has far too few stable properties.

The registered print likely can't be a key because it's stored on disk
and we don't know the format etc. The format itself is encrypted to
prevent an attacker from crafting their own fingerprint based on the
registered print, so not a lot is known about it.

About the only way this could work is if the fingerprint device itself
had a secured datastore, working on the theory that it's much harder to
attack the chip itself than a regular storage device.  Place the
passphrase and a registered fingerprint in the datastore and only
release the passphrase when a matching print is offered.

-- 
Thinkfinger doesn't unlock keyring
https://bugs.launchpad.net/bugs/276384
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to