summaryrefslogtreecommitdiffhomepage
path: root/doc/todo/remove_gpg_key_passphrase_from_backed_up_gpg_keys.mdwn
diff options
context:
space:
mode:
authorSean Whitton <spwhitton@spwhitton.name>2017-08-16 11:41:25 -0700
committerSean Whitton <spwhitton@spwhitton.name>2017-08-16 11:41:25 -0700
commit379f036b39e0f7dac360ba04b281f6ea4ce8f20e (patch)
tree01a86517d6234562088561c3c4b51365ed722807 /doc/todo/remove_gpg_key_passphrase_from_backed_up_gpg_keys.mdwn
parent680449e656820db2b899a8631060cf62359b9b74 (diff)
parent0229f026b1ae0344c4c052593564800035268d81 (diff)
downloadkeysafe-379f036b39e0f7dac360ba04b281f6ea4ce8f20e.tar.gz
Merge tag '0.20170811'
tagging package keysafe version 0.20170811 # gpg: Signature made Fri 11 Aug 2017 03:58:54 PM MST # gpg: using RSA key 28A500C35207EAB72F6C0F25DB12DB0FF05F8F38 # gpg: Good signature from "Joey Hess <joeyh@joeyh.name>" [full] # Primary key fingerprint: E85A 5F63 B31D 24C1 EBF0 D81C C910 D922 2512 E3C7 # Subkey fingerprint: 28A5 00C3 5207 EAB7 2F6C 0F25 DB12 DB0F F05F 8F38
Diffstat (limited to 'doc/todo/remove_gpg_key_passphrase_from_backed_up_gpg_keys.mdwn')
-rw-r--r--doc/todo/remove_gpg_key_passphrase_from_backed_up_gpg_keys.mdwn17
1 files changed, 17 insertions, 0 deletions
diff --git a/doc/todo/remove_gpg_key_passphrase_from_backed_up_gpg_keys.mdwn b/doc/todo/remove_gpg_key_passphrase_from_backed_up_gpg_keys.mdwn
new file mode 100644
index 0000000..5a370be
--- /dev/null
+++ b/doc/todo/remove_gpg_key_passphrase_from_backed_up_gpg_keys.mdwn
@@ -0,0 +1,17 @@
+Remove gpg key passohrase from gpg keys that keysafe backs up.
+
+The reason for this is that the user may well forget their gpg key
+passphrase, and it's *weird* to restore a key with keysafe's password
+and then have it passphrase protected.
+
+The gpg key passphrase is intended only to keep a key from being used
+for a short period of time (a week or so) when the device holding it
+is known to have been compromised, so the key can be revoked.
+This doesn't really apply to keys backed up with keysafe -- if they get
+compromised somehow, the user won't know, and cracking the gpg passphrase
+should be almost trivial to an attacker who was able to break keysafe's
+password.
+
+paperkey can remove gpg key passphrases. Is there any better way?
+It might make sense for keysafe to prompt for a new gpg passphrase
+when restoring.