[Authentication] Some input

Michael Leupold lemma at confuego.org
Sat Jul 11 02:34:25 PDT 2009


Hi,

On Friday 10 July 2009 20:40:54 Dieter Plaetinck wrote:
> And now the "real" input, which are mostly just thoughts that popped
> into my head:
>
> - configurable encryption for persistent storage? algo, key size etc.
>   gnupg integration?

This is currently meant to be implementation-defined though the algorithms 
used for negotiating a session remain to be specified.

> - master password unlocks key, key unlocks data?

That's one way to do it, though at least KWallet uses the hashed password as a 
key to decrypt all of a wallet's ("collection") contents. Not quite sure about 
keyring, but I guess it's currently the same.

> - can it be usable without dbus? some people don't like dbus. simple
>   CLI program to query the database?

While it should be possible it's currently not planned as part of the 
specification. After all even CLI programs may use the D-BUS :)

> - datastore : some kind of binary format?

Implementation defined. While most users will be using encrypted files for 
storing their secrets they might also be written to a TPM, a smartcard or even 
some central server (ldap?).

> - ACL for apps: a plaintext config maintained by user? maybe itself
>   stored within the secret storage?  would apparmor/selinux/.. already
>   support something like this?

ACLs aren't part of the specification either but are currently used by 
keyring/wallet. AFAIK keyring uses /proc to find out, KWallet just trusts 
whichever name the applications says it has. As I understand it SELinux could 
be used to manage some of those ACLs. Still ACLs are currently not meant to be 
part of the API. They can't be a required part anyway because there's no 
guarantee that all platforms will have sufficient support for low-level 
features required to implement them (eg. Windows is a target platform for KDE 
and I fear we won't see proper ACL on it).

> - unlocking ssh keys by unlocking the secret store? or the other way
>   around: unlocking the secret store with an ssh key? or hell..
>   make the secret store an ssh-agent ? gnupg? PAM ?
>   type master pass once, have ssh/gnupg/pam (login) for free?

As I understand it most of those features will be able to live on the client-
side though eg. PAM support may require an additional call to unlock a 
collection using a password.

> - the previous could be taken a step further: some people have
>   encrypted blockdevices (hard disks) in Linux which they unlock at
>   boot time (or in initramfs for / ), could this be integrated somehow?

I think it should well be possible provided the daemon (which is running 
inside a user's session on the session bus) is up before and there's a way to 
unlock it (eg. after user login inside the X session). I'd categorize this as 
a client feature as well.


On a sidenote not everything has been settled. The thin line between 
implementation- and specification defined features is currently still sketchy 
and we might reconsider where to put a feature if we see the need. Yet I think 
it's best to keep the spec as slim as possible.

Regards,
Michael
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part.
Url : http://lists.freedesktop.org/archives/authentication/attachments/20090711/8233374b/attachment.pgp 


More information about the Authentication mailing list