[32684] in Kerberos
Re: What happens if my KDC is compromised?
daemon@ATHENA.MIT.EDU (Jeffrey Altman)
Fri Sep 17 17:21:20 2010
X-Envelope-From: jaltman@secure-endpoints.com
X-MDaemon-Deliver-To: kerberos@mit.edu
Message-ID: <4C93DBC1.70107@secure-endpoints.com>
Date: Fri, 17 Sep 2010 17:21:05 -0400
From: Jeffrey Altman <jaltman@secure-endpoints.com>
MIME-Version: 1.0
To: kerberos@mit.edu, bcymet@cbnco.com
In-Reply-To: <DD5B7BEA-6B94-4091-B4A2-CD8D3B8702C7@mit.edu>
Reply-To: jaltman@secure-endpoints.com
Content-Type: multipart/mixed; boundary="===============1492729167=="
Errors-To: kerberos-bounces@mit.edu
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============1492729167==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="------------enigCD4B112FF4FAD6A488A7D5D8"
This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enigCD4B112FF4FAD6A488A7D5D8
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
On 9/17/2010 2:33 PM, Ken Raeburn wrote:
>
>
> This is why, every now and then, people revisit the idea of some kind o=
f "tamper-proof" hardware for the core of the KDC, which would theoretica=
lly self-destruct and not reveal the master key if tampered with; externa=
l communication would be limited to a few KDC messages and (encrypted, an=
d maybe signed) KDB data, to reduce the vulnerability exposure possibilit=
ies in that code, even if the computer housing the tamper-proof card were=
compromised. It's an interesting idea, but AFAIK it hasn't gone beyond =
research projects so far.
Secure Endpoints has a Heimdal based Hardware Secure KDC product that is
nearing completion. We presented a talk at the 2009 AFS and Kerberos
Workshop on our model.=20
http://workshop.openafs.org/afsbpw09/wed_3_3.html
The Heimdal-HSM KDC can run on UNIX platforms as well as Microsoft Window=
s.
If you are interested in pricing and availability, contact me directly.
Jeffrey Altman
Secure Endpoints Inc.
--------------enigCD4B112FF4FAD6A488A7D5D8
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)
iQEcBAEBAgAGBQJMk9vDAAoJENxm1CNJffh4WvIH/089Q23syJYQ9/TxTPrtFuPm
K5vHDqG9fIDxz+wFEXB3louBh9WAUCAdLnOX83oUToIVlTmJYdZHZ5DMozr3D0mf
BVueW9uh2zBoMnc5NjlL7DHEfExJ7vWyVWv2m5UnUvKnF+dZMOxvwa3MLQpw92Zz
pPXGJbyAgLFL8sn4wmrgW6UlWbJ9ZLOt4r8LAL1TLBQDmK2P/K8AAbbSJt039dl8
K71e3y7ko31jLCsfzLJw/UTuIKNyknCvycS9Ii+dw5bFsvu4ZhPmWhrJq9txCXRn
abK4O+HG3yUUt4k/JGbbKhYwpJAywi/NQz+Rbk01Fa1zq2YbJ9pTgU2M1rQzTY8=
=iIMP
-----END PGP SIGNATURE-----
--------------enigCD4B112FF4FAD6A488A7D5D8--
--===============1492729167==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
________________________________________________
Kerberos mailing list Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos
--===============1492729167==--