[149138] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] HSM's

daemon@ATHENA.MIT.EDU (Peter Todd)
Mon Jan 20 14:15:54 2014

X-Original-To: cryptography@metzdowd.com
Date: Mon, 20 Jan 2014 13:19:22 -0500
From: Peter Todd <pete@petertodd.org>
To: ianG <iang@iang.org>
In-Reply-To: <52DD5227.6020303@iang.org>
Cc: Jerry Leichter <leichter@lrw.com>,
	Thierry Moreau <thierry.moreau@connotech.com>,
	cryptography@metzdowd.com, Bill Frantz <frantz@pwpconsult.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


--===============4349037032107931163==
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="uZ3hkaAS1mZxFaxD"
Content-Disposition: inline


--uZ3hkaAS1mZxFaxD
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Mon, Jan 20, 2014 at 07:43:19PM +0300, ianG wrote:
> At CAcert I more or less decided I could not trust the HSMs, as
> essentially they were unauditable.  I don't see that has changed, and
> what I've heard of other CA practices is that they basically wing it in
> this direction.  I guess some Auditors just nod off as soon as they hear
> that an approved (?) HSM is used without even checking the circumstances
> of the procurement and usage.
>=20
> So we stuck with the "home grown" HSM concept which was to build a
> machine, and lock it down in the secure rack.  This has the risk that
> someone can sneak in and steal the root by opening it up.  My call was
> that as the CA had covered pretty much all the other risk better, this
> was an acceptable risk.  But in the future they should work to reduce
> this one as well.

And this is why we need n-of-m multiple key support in OpenPGP: I don't
really trust your home-grown HSM, or the professional one, but the
chance of both being backdoored is low.

--=20
'peter'[:-1]@petertodd.org
00000000000000002298c84800822ac5076148e94f5ef4fe20af1c98855fee27

--uZ3hkaAS1mZxFaxD
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iQEcBAEBCAAGBQJS3WipAAoJEBmcgzuo5/CFpvUH+wVzRYKhQX1DanaTGaefmmXV
VxsihAsQ4Yp5JIizXmEPtdP+nSykUiTEpMBvGMv/rA0ZxVZLqv2loyFXOirbmBZp
bLYfNZ1Fy8mFtFP0JPiXR/CPSLmgv6pVS01aV4WHpx7FWFHznYZO81llEcsG/3nc
9mqkU0iJVRBkXIA7s7WBoDkPF+M2NPwk+g0TQ2AehdzRMZyh4elEioIG6uIcCnaO
vhNl70tzrEUv3FY4ZYgs72G4f9gGfIyqCoWS1p/3Uc4SF4zk0t7E/APo5SKoZGxV
2p5XhhJgqd3cdWPfKs7KKVoyGNHQmahi1btU4uoodpd+vm55xiWWpeI+xX1kzhg=
=Bkiq
-----END PGP SIGNATURE-----

--uZ3hkaAS1mZxFaxD--

--===============4349037032107931163==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============4349037032107931163==--

home help back first fref pref prev next nref lref last post