Re: [+gnome] Re: Showing gnome-keyring passwords in Seahorse [was: Proposal for Seahorse inclusion in GNOME 2.18]
- From: Chipzz <chipzz ULYSSIS Org>
- To: Wouter Bolsterlee <uws xs4all nl>
- Cc: desktop-devel-list gnome org
- Subject: Re: [+gnome] Re: Showing gnome-keyring passwords in Seahorse [was: Proposal for Seahorse inclusion in GNOME 2.18]
- Date: Tue, 12 Sep 2006 14:12:57 +0200 (CEST)
On Mon, 11 Sep 2006, Wouter Bolsterlee wrote:
På Mon, Sep 11, 2006 at 08:41:58AM +0200, Alexander Larsson skrev:
Interesting. However, isn't there a small security value in protecting
just the fact that you have a password stored for a particular target?
And anyway, you need to unlock the keyring at least, because all that
information is stored encrypted.
And that's where pam-keyring comes into play:
Yes, and it is an very stupid idea to use it. Reading those entries, it
would appear you are just being lazy and care little about security.
I don't see the point in saving yourself a few keystrokes, especially
since you only have to type your ssh passphrases once (at the beginning
of your session), and your gnome keyring passphrase also only once. I
would advise strongly against using it.
BTW, you do know the difference between passwords (like those being used
to log in) and passphrases (like the ones to unlock your ssh/pgp keys),
right?
[1] http://uwstopia.nl/blog/2006/08/password-hell-gdm-ssh-gnome-keyring
[2] http://uwstopia.nl/blog/2006/08/password-hell-part-ii
mvrgr, Wouter
kr,
Chipzz AKA
Jan Van Buggenhout
--
------------------------------------------------------------------------
UNIX isn't dead - It just smells funny
Chipzz ULYSSIS Org
------------------------------------------------------------------------
"Baldric, you wouldn't recognize a subtle plan if it painted itself pur-
ple and danced naked on a harpsicord singing 'subtle plans are here a-
gain'."
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]