People use passwords and secret keys for a lot of different services, e.g., firefox, pidgin, gnome keyring, ssh keys, pgp keys. All of this data is normally stored in the home directory of a user.

An easy solution is to make the filesystem itself encrypted, see EncryptedFilesystems.

Things get more complicated if several different computers are in use, e.g. a laptop and a desktop system. A way to make this possible is the storage of the credentials on an (encrypted) USB stick.

Use cases

This should allow:

This should protect against:

Basic Idea

Credentials

Epiphany / Firefox

Pidgin

Gnome keyring

SSH keys

PGP keys


This is from a mail from evan to scott:

The use case for this is obvious. People have authentication information for a variety of systems: pam login credentials, ssh keys, pgp keys, firefox keyring, gnome keyring. Managing these is a pain, so efforts have been made to centralize your credentials (firefox, gnome), but using such systems means that if your computer is compromised, so is every system you have access to. We recently saw this with a distro team member having to revoke his PGP key because his laptop was stolen.

Your passwords and keys should be on a separate physical device, ideally a USB key. While using a smart card (which is the approach that Fedora seems to be taking: google for fudcon-buston-2007-single-sign-on.ogg) would be best, they are not easy to come by.

* * Probably the best way of backing up the key would be simply to have two USB keys, with the option in Password Manager to duplicate the key when a new blank USB disk is inserted. That way one copy could be kept in a secure location, for example in a safe or lockbox. If both keys are inserted at the same time, the system would recognise that two copies of the same key have been inserted and silently sync or update the older copy.