Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Am I right to think it isn't secure at all to upload a private key, even if it's the only way to decrypt received (and encrypted messages) ?
Ser Olmy has correctly answered the question.
But I cannot but tremble at the very thought of people seeing uploading a private key as an option. Where you write “the only way to decrypt received and encrypted messages” – and as there may be people reading this thread – I have to add that a service which necessitates that a private key be “uploaded” has disqualified itself as being a “a service” in the first place.
This should not exist and It should not be necessary to ask the question.
Last edited by Michael Uplawski; 06-21-2022 at 12:44 AM.
Reason: private
I believe that the correct option would be to upload your public key only. This will allow anyone to send an encrypted message to you which only you could then decrypt.
You would need to upload a private key only if you intended to use their "web-mail screen" to review your incoming mail. Ordinarily, I do not do this – I use a dedicated email client which can gather the mail from every e-mail account that I have and present it all to me at once. This email client has a PGP plug-in to handle encrypted traffic, referencing a private key that is only stored on my machine.
I am also rather surprised that this service does not know about "PGP key servers" and does not use them. I think of this as a deficiency.
Last edited by sundialsvcs; 06-21-2022 at 09:21 AM.
I am also rather surprised that this service does not know about "PGP key servers" and does not use them. I think of this as a deficiency.
The status of the key server network (and all kinds of key server networks) would interest me. In view of recent exchanges I must assume, that we lack reliable services. Unfortunately I do not understand much about the new exigences, nor the deficiencies of the old key servers. New ones appear to not meet the requirements. That is all I know... the rest is technical gibberish.
GnuPG has changed so much in recent years that what I use nowadays is a mostly unknown software to me.
Last edited by Michael Uplawski; 06-21-2022 at 02:01 PM.
I was quite surprised to see the offer of uploading a private key. This make sens when you rely on the webmail to decrypt. What would worry me is that I have not seen anything that may be an additional layer of protecting a private key (no export, some encryption of the key itself or whatever).
While the server is vulnerable (aren't we all ?), it looks quite stupid to put a private key at such risk.
If you intend to use a web page to access your private, encrypted mail, then it is of course necessary that you must upload your private key to the service. (As well, perhaps, as the public key.) This would be the only reasonable – but, necessary – reason for you to upload a private key.
Yes, it is certainly possible for a private key to be encrypted with a passphrase, and in this scenario you would want to do that. I am not familiar enough with this mail-service to know whether they support this. (Of course they should ...)
"Key servers" are an accepted source of various users' public keys. If you want to send a private message to someone, you interrogate the key-server system to find the necessary public key and add it to your keychain. PGP®/GPG-aware mail client software will often simply do this for you, behind the scenes.
Last edited by sundialsvcs; 06-21-2022 at 07:23 PM.
Yes, it is certainly possible for a private key to be encrypted with a passphrase, and in this scenario you would want to do that. I am not familiar enough with this mail-service to know whether they support this. (Of course they should ...)
A properly designed crypto-aware email service should not allow you to upload a private key that isn't passphrase-protected. It should prompt you each time for the passphrase, and "on their honor" never keep it. I don't know if the designers of this service did that.
A private key (or even a public one ...) should never be anywhere "public" ... e.g., on a laptop in any airport anywhere, where it might be stolen ... unless it is passphrase-encrypted. (This is especially important in the case of VPN ... which should n-e-v-e-r(!) rely on "mere passwords = PSKs.")
Last edited by sundialsvcs; 06-21-2022 at 07:32 PM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.