-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unlocking pass_secret_service doesn't require password. #32
Comments
Related to #11.
Probably, for now. |
The way it's done with GPG KWallet, is you set up a passphrase-protected key via the likes of Kgpg or Kleopatra, and use that for the GPG encryption. The passphrase is prompted by GPG via One other thing to look out for: |
Since I don't use GPG often, I forgot there are TTL options to remove keys from the cache automatically after some time period, mainly |
Is this the fix for this issue? |
That's the fix for The fix for the whole issue (or at least one possible fix) is everything I wrote about, put together:
|
I suggest setting up the new key on a fresh sub-folder with Note that haven't tried any of this myself, so make a backup, and proceed cautiously at your own risk... |
Can you document this somewhere? The problem for me is that pam_gnupg automatically unlocks GPG upon unlock of swaylock and during login. |
I'm not associated with this project, I only found it when discussing Secret Service over at bugs.kde.org (specifically, bug 399232). Most of this is documented in the manuals and webpages of The only thing not documented in those places is the From my point of view, the information I provided here and in #23 (comment) is enough aggregation of those sources. I hope it is useful, but that's as far as I'll be going with this, at least for now.
You can disable |
Adding Unlocking pass_secret_service doesn't require GPG password at all. It doesn't require any password. But, opening a password entry in pass_secret_service may require entering GPG password if password is not cached in gpg-agent's internal cache. I think secret service is not aware of pinentry or GPG. |
As I understand it,
I'm not even sure what you mean by "Unlocking When you (or a client app) call the Secret Service
That is the correct behavior, in my understanding. I'm not sure what else you want to happen here.
The Secret Service API is not aware of the backend at all, and doesn't care about it. However,
Have you properly read #32 (comment) ? If you're already using a passphrase-protected GPG key, then the main thing to do is set the TTL options, mainly
But if your keys are still cached in |
I locked and unlocked pass_secret_service via seahorse which is a GUI frontend to secret service API. According to my tests, pass_secret_service's implementation of Unlock() doesn't seem to pass password request to GPG or pinentry. On the other hand, when I tried to view a specific password entry, I was prompted to enter a password into pinentry. I cleared GPG internal password cache before testing this. My conclusion is that pass_secret_service should pass password request to pinentry, but it doesn't now. |
I see. I'm not familiar enough with |
Because pass_secret_service doesn't actually have password?
Am I supposed to lock and unlock gpg?
The text was updated successfully, but these errors were encountered: