diff options
author | Werner Koch <[email protected]> | 2016-05-01 18:04:39 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2016-05-02 11:18:20 +0000 |
commit | c88efcc2cc7fde25fdba36a349f670f741fd4e9a (patch) | |
tree | 1ce07268a925c2bcbc825ac2fb3b67112d6743ed | |
parent | scd: More fix of error return path. (diff) | |
download | gnupg-c88efcc2cc7fde25fdba36a349f670f741fd4e9a.tar.gz gnupg-c88efcc2cc7fde25fdba36a349f670f741fd4e9a.zip |
doc: Add a comment about the goals of the agent.
--
-rw-r--r-- | doc/gpg-agent.texi | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/doc/gpg-agent.texi b/doc/gpg-agent.texi index 5a387d42a..d89003625 100644 --- a/doc/gpg-agent.texi +++ b/doc/gpg-agent.texi @@ -54,6 +54,32 @@ The agent is automatically started on demand by @command{gpg}, Thus there is no reason to start it manually. In case you want to use the included Secure Shell Agent you may start the agent using: +@c From dkg on gnupg-devel on 2016-04-21: +@c +@c Here's an attempt at writing a short description of the goals of an +@c isolated cryptographic agent: +@c +@c A cryptographic agent should control access to secret key material. +@c The agent permits use of the secret key material by a supplicant +@c without providing a copy of the secret key material to the supplicant. +@c +@c An isolated cryptographic agent separates the request for use of +@c secret key material from permission for use of secret key material. +@c That is, the system or process requesting use of the key (the +@c "supplicant") can be denied use of the key by the owner/operator of +@c the agent (the "owner"), which the supplicant has no control over. +@c +@c One way of enforcing this split is a per-key or per-session +@c passphrase, known only by the owner, which must be supplied to the +@c agent to permit the use of the secret key material. Another way is +@c with an out-of-band permission mechanism (e.g. a button or GUI +@c interface that the owner has access to, but the supplicant does not). +@c +@c The rationale for this separation is that it allows access to the +@c secret key to be tightly controled and audited, and it doesn't permit +@c the the supplicant to either copy the key or to override the owner's +@c intentions. + @example gpg-connect-agent /bye @end example |