keybase / keybase-issues

A single repo for managing publicly recognized issues with the keybase client, installer, and website.
901 stars 37 forks source link

github remote keybase:// is actually less secure than ssh://git@github ? #3142

Open jodavaho opened 6 years ago

jodavaho commented 6 years ago

Keybase does not seem to address the same security model as PGP / SSH, and this can be misleading to users.

PGP and SSH both have strong-passphrase recommendations, so that even if a user gains access (remote or local) to your machine (and therefore likely your id_rsa, gpg keys), you are protected from them accessing your encrypted files or server connections while posing as you.

Keybase is harmful to protections against that threat model by:

The first one is particularly damaging, because one can git clone any repository after running run_keybase without any password or identity confirmation. The data is then presented unencrypted to the user. The fact that this is stored in plaintext on the hard drive could be written off as "Encrypted git protects against server intrusion only".

But for device-level intrusion, what mechanism exists to revoke device access to an encrypted github repository or prevent malicious modifications to server-stored data? Effectively none, beyond " Keep your device secure "?

strib commented 6 years ago
junderw commented 6 years ago

Comparing apples to oranges.

ssh is encryption of transport to server which stores data in plaintext keybase is encryption of git objects before transport to server which only ever sees ciphertext.