Skip to content
This repository has been archived by the owner. It is now read-only.

Is key management secure? #252

Closed
ghost opened this issue Apr 16, 2017 · 2 comments
Closed

Is key management secure? #252

ghost opened this issue Apr 16, 2017 · 2 comments

Comments

@ghost
Copy link

ghost commented Apr 16, 2017

Hello everyone! I am wondering whether we should make use of other programs which do only one job, but do this job very well. For example, GPG could be used to store the private keys. GPG is good at this (see gpg-agent etc) and we can offload the security implications to GPG.

Apart from the important security increase, there are disadvantages we need to discuss:

  1. A dependency in introduced. This is especially pressing since the aim is to let IPFS run in a browser. I propose to let the user decide: when the user set an empty password, no GPG gets used.

  2. It is inconvenient to enter a password to decrypt the private key. GPG has a solution for this, called gpg-agent. AFAIK, the private key is used in IPFS seldomly anyway, so this may not constitute a problem. I think users are willing to enter a passphrase if they only have to do it when they remap their ipns hash to a new ipfs hash. Again, the user may leave the password blank and GPG can store it in secmem etc, but no user interaction is requried.

What do you think?

@lidel
Copy link

lidel commented Apr 16, 2017

AFAIK keys of IPFS node (used for IPNS publishing and node identity) are already managed by go-ipfs itself. Related discussion: https://discuss.ipfs.io/t/ipns-publishing-after-generating-a-key/

As for using other tools for data encryption, there is a related discussion at: https://discuss.ipfs.io/t/possibility-to-restrict-file-access-for-users-in-network/

@flyingzumwalt
Copy link
Contributor

flyingzumwalt commented May 23, 2017

This issue was moved to https://discuss.ipfs.io/t/is-key-management-secure/261

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants