|
Message-ID: <CANTw=MMTpo4nmn06Hj+pXKkt9=TO5_idEi=XXGd-1xwYQHFrgw@mail.gmail.com> Date: Mon, 24 Sep 2012 20:24:00 -0400 From: Michael Gilbert <michael.s.gilbert@...il.com> To: oss-security@...ts.openwall.com Subject: Re: Re: Re: Re: Re: CVE request(?): gpg: improper file permssions set when en/de-crypting files On Mon, Sep 24, 2012 at 5:46 PM, Tavis Ormandy wrote: >> > I think you've misunderstood the problem, and it's trivial to solve. >> >> No, I'm thinking about the broader implication. If you're arguing that >> gpg should be modified to better handle permissions, then all applications >> potentially handling sensitive information should as well: file editors, >> and what not. Otherwise, what makes gpg such a special case? >> > > I think you've confused my post with someone elses. See Steve Christy's snowball post. Again, I'm considering the totality of the system. Setting 644 as a default for gpg is I suppose a step, but gpg is not the only application handling sensitive data. If that is the case, then there are a whole lot of other applications also not doing the right thing with your sensitive data including those that pipe and redirect stdin/stdout. Again, I don't know how to make it any clearer, but I'm considering the broader implications, not just gpg. I still don't understand again why gpg is so special? Best wishes, Mike
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.