-
-
Notifications
You must be signed in to change notification settings - Fork 501
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove configuration options #206
Comments
|
I agree that we can get rid of most of them. Providing them via env seems way easier. |
* Simplify configuration Fixes #206 * Fix recipient tests * Fix integration tests
@dominikschulz does the old configuration file will be compatible when updating gopass ? Thanks |
The old configuration will be compatible, but some behavior may change depending on the values you used. If you have specific concerns we will try to address them before the next release. |
As of written, my concern was about This morning I have faced an actual issue : a new secret insertion have been rejected.
|
|
Yep I had noticed this.
I'd be happy to help for testing purpose, so i'll clone this whole setup for later Thanks. |
Will try to look into this soon. |
Ok, after testing and reading your bug report twice I finally noticed the important detail: Fact is that AlwaysTrust is always true for some time, but unfortunately CheckRecipients is always true as well, that way unseable keys won't even be passed to GPG. So AlwaysTrust doesn't matter anymore. For now we should disable CheckRecipients until we figure out how to handle this. |
Hi, I know most of what has been discussed here as been merged already, but I can't help but notice a possible security issue here. I can open a separate issue if needed. The alwaystrust config option has been removed and now the alwaystrust argument is always passed to gpg. If the autoimport feature is enabled (default true), I see a huge security issue. If an attacker manages to commit to my repository a GPG key I do not trust, and I'm not careful when pulling (can easily be overlooked if there is a lot of changes in the history), it means that I will soon start reencoding my password with the attacker's public key. My understanding is that if alwaystrust was not set, the pubkey of the attacker would be added to my keyring, but gopass would not reencrypt my password file with its pubkey (would probably spit out an error message). I actually was confronted to this behavior this very afternoon when trying to set up the tool with a colleague of mine and it certainly does not look like a sane default behavior. Am I missing something obvious here? Regards, |
Never mind my previous comment: I opened a separate issue for this problem (#305) in order to give it a better visibility. |
Has |
Yes, |
* Simplify configuration Fixes gopasspw#206 * Fix recipient tests * Fix integration tests
gopass
supports lots of configuration options.This offers a lot of flexbility but adds lot of cognitive overhead to users and developers and makes testing all combinations quite hard.
We should try to reduce the number of configuration options to a bare minimum.
I propose the following changes:
The text was updated successfully, but these errors were encountered: