Jump to: navigation, search

Dev/Split GPG

< Dev

General, non-Whonix related, enhancements that would be useful for Qubes Split GPG.

Questions[edit]

  • Could /usr/bin/qubes-gpg-client-wrapper used from the gpg client VM be used to delete the keys in the gpg server VM?

Notification Enhancement[edit]

The current notification...

Keyring access from domain:
work-mail

is not that secure.

  • Gets unnoticed when being away. (A compromised VM could wait for that.)
  • Mass requests could not be stopped early enough.
  • Popup not using the Centralized Tray Notification (not yet implemented) - so popups are easily missed when being away for a short time.
  • Reading one mail in enigmail results in 3 popups flashing up. Users are accustomed to that popup spam. The malicious request could be sneaked in unnoticed into that.

show input to be processed by Split GPG Server[edit]

The Split GPG server VM could show and request each and every gpg command to be executed.

Purpose:

  • Preventing gpg from being exploited by maliciously crafted input by having the user manually have a look if the input looks strange.
Going to run the following command:

/usr/bin/qubes-gpg-client-wrapper --charset utf-8 --display-charset utf-8 --no-emit-version --no-comments --display-charset utf-8 --batch --no-tty --status-fd 2 --max-output 487200 --decrypt --use-agent

Content of stdin is:

```
-----BEGIN PGP MESSAGE-----
....
-----END PGP MESSAGE-----
```

Okay?
Yes | No [default]

Show processed output of GPG Server VM before relaying back[edit]

The Split GPG server VM could show the output of a request before sending it back to the client VM.

Purpose:

  • Have the user check if what has been decrypted looks like expected. I.e. seeing an old mail being decrypted that was not requested could alert the user, that the gpg client VM has likely been compromised.
  • Have the user only sign documents the user really wanted to sign and not maliciously altered copy.
The output of the following command:

 /usr/bin/qubes-gpg-client-wrapper --charset utf-8 --display-charset utf-8 --no-emit-version --no-comments --display-charset utf-8 --batch --no-tty --status-fd 2 --max-output 487200 --decrypt --use-agent

was:

```
decrypted text goes here
```

Send back to gpg client VM?

Yes | No [default]

x[edit]

--yes --set-notation --sign-with --output reprepro


Random News:

Join us testing new AppArmor profiles for improved security! (forum discussion)


Impressum | Datenschutz | Haftungsausschluss

https | (forcing) onion
Share: Twitter | Facebook | Google+
This is a wiki. Want to improve this page? Help welcome, volunteer contributions are happily considered! See Conditions for Contributions to Whonix, then Edit! IP addresses are scrubbed, but editing over Tor is recommended. Edits are held for moderation. Whonix (g+) is a licensee of the Open Invention Network. Unless otherwise noted above, content of this page is copyrighted and licensed under the same Free (as in speech) license as Whonix itself.