TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Secure OpenPGP Key Pair Synchronization via IMAP

46 点作者 felixhammerl大约 9 年前

3 条评论

geofft大约 9 年前
It seems like this relies entirely on the strength of the secondary passphrase, and in turn of the storage by which that passphrase is moved from client to client. And if the encrypted private key is ever readable, it is <i>forever</i> vulnerable to attacks. They can spend as long as they like brute-forcing the secondary passphrase, or looking for the Post-It note where you inevitably wrote down the generated passphrase.<p>It also seems like there&#x27;s no key-stretching involved, right? The cost of each brute-force attempt is very cheap? So the option of permitting a user-generated passphrase (with much lower entropy) seems like a pretty bad idea.<p>Have you looked into password-authenticated key exchange (PAKE) mechanisms? <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Password-authenticated_key_agreement" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Password-authenticated_key_agr...</a> My understanding is they let you use a relatively weak passphrase to authenticate a short-term session using a new 128-bit key, and once that session is established, attacks need to be against the session key, not the passphrase. This involves a bit more active communication than simply leaving an encrypted key in an IMAP folder, but you could do something where a new client requests a key by dropping a message in the folder, then you have to physically go to the old client to confirm it, which leaves a new message in the folder that (only) the new client can use.<p>I believe Firefox Sync uses a similar approach, except that the low-entropy passphrase is a PIN automatically generated by one of the devices, so the UX feels sort of like Bluetooth pairing.
cvwright大约 9 年前
Looks interesting. But I think I must be missing something.<p>Are the symmetric keys that are used to encrypt the private keys derived from a password, or not?<p>&gt; This protocol overcomes this weakness by wrapping all key packets, encrypted with a key derived from a second high-entropy alphanumeric passphrase.<p>&gt;<p>&gt; The passphrase SHOULD be a random high-entropy uppercase alphanumeric string of 24 characters, generated from a cryptographically secure pseudo-random number generator (CSPRNG).<p>So do you seed the CSPRNG starting from something derived from a password? And if not, then how do you decrypt your private keys when you want to use them on a new device?
评论 #11562721 未加载
psiconaut大约 9 年前
It&#x27;d be interesting to formalize this as an IMAP extension, and announce it as a capability in the server.