[Bug 279224] New: Kleopatra feature request: should encrypt exported certificates
jonathan ferguson
jdpf.plus at gmail.com
Wed Aug 3 00:11:33 BST 2011
https://bugs.kde.org/show_bug.cgi?id=279224
Summary: Kleopatra feature request: should encrypt exported
certificates
Product: kleopatra
Version: 2.0.8
Platform: Debian testing
OS/Version: Linux
Status: UNCONFIRMED
Severity: wishlist
Priority: NOR
Component: general
AssignedTo: kdepim-bugs at kde.org
ReportedBy: jdpf.plus at gmail.com
CC: mutz at kde.org
Version: 2.0.8 (using KDE 4.6.5)
OS: Linux
This is a feature request to encrypt GPG certificates when exporting private
keys. As of Kleopatra 2.0.12, "File --> Export Secret Key..." will copy the GPG
private key in an ASCII armored (if desired) format. This key is unencrypted,
and at risk of compromise. Encrypting the key using a symmetric algorithm is
easy to do with GPG, and would protect users who want/need to have their
private keys on removeable media, or in multiple active locations.
Exporting the public and private GPG keys in an encrypted fashion can be done
using the following commands [1], for example:
gpg -K
gpg --output pubkey.gpg --export {KEYID}
gpg --output - --export-secret-key {KEYID} |\
cat pubkey.gpg - |\
gpg --armor --output keys.asc --symmetric --cipher-algo AES256
pinentry, if installed and configured, will prompt users for a symmetric AES256
passphrase. The resulting asc file will then be encrypted, and can be sent
across a dangerous network, or written to, say, a Flash device. The UI should
make clear that the password is encrypting the asc file only. At present, the
help files for Kleopatra only say "File -> Export Secret Key..." should
basically not be done. This is unhelpful to end users, and is comparatively
easy to fix..
In a related note, eradicating stored data (in this case, the exported private
GPG key), is the subject of debate [2,3,4]. Exporting the file in an encrypted
fashion permits the UI to "do the right thing" even if a user is not well
educated in cryptography. Of course, some explanatory text for the export
dialog would serve users well. In these cases, "shred" is your friend. :-)
[1] http://montemazuma.wordpress.com/2010/03/01/moving-a-gpg-key-privately/
[2] http://en.wikipedia.org/wiki/Data_remanence
[3] http://www.nber.org/sys-admin/overwritten-data-gutmann.html
[4]
http://www.usenix.org/publications/library/proceedings/sec96/full_papers/gutmann/index.html
Thanks for making great software!
have a day.yad
jdpf
Reproducible: Always
Steps to Reproduce:
1. Launch Kleopatra.
2. Choose a "certificate"
3. Choose "File --> Export Secret Key..."
4. Read the resulting keyfile, it is the naked GPG private key.
Actual Results:
The resulting keyfile, it is the naked GPG private key.
Expected Results:
Resulting keyfile from "Export Secret Key..." should be AES encrypted. Like so:
gpg -K
gpg --output pubkey.gpg --export {KEYID}
gpg --output - --export-secret-key {KEYID} |\
cat pubkey.gpg - |\
gpg --armor --output keys.asc --symmetric --cipher-algo AES256
Example from
http://montemazuma.wordpress.com/2010/03/01/moving-a-gpg-key-privately/
OS: Linux (x86_64) release 2.6.39-2-amd64
Compiler: gcc
--
Configure bugmail: https://bugs.kde.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
More information about the Kdepim-bugs
mailing list