Jakob Schlyter wrote:
On 1 aug 2010, at 16.43, Thierry Moreau wrote:

Technically, the USG requested FIPS-140-2 level 4 HSM technology for the DNS 
root signing gear. This implies a single source, with a very inflexible user 
interface (no special personalization of the HSM for the DNSSEC project). The 
threshold scheme was present in the vendor offering but there was no documented 
use of it (it may have been used internally by some organizations that would 
have taken seriously the dual control principle but who knows).

I'm not sure what you mean with "no documented use of it" and I'm not sure why 
there is a need to add any FUD on this matter. If you have any questions or doubt 
regarding the m-of-n implementation and its use, I'm sure we can get the appropriate 
answers from the vendor.


I was referring to "documented use of it" *before* the ICANN work on DNS root signature. I am sorry if you understood differently.


I don't know whether a number-theoretic foundation lies behind the threshold 
scheme. In any event, the crypto value protected by the scheme is the long term 
(intergity-)encryption key for the HSM configuration file, which includes the 
DNSSEC KSK private key.

The storage master key (SMK) used for key backup is protected by a 5 of 7 
scheme. The activation key for  the HSM key material (aka AAK) is protected by 
a 3 of 7 scheme. This is all documented in the DPS.


I am quite sure the activation keys are outside the scope of attention by Peter. Activation keys relate to a very different set of threats and vulnerabilities.


The detailed usage (the HSM is FIPS-approved, the usage is outside of compliance scope) 
is also documented (as usual you have to infer the operating principles from a plethora 
of minute details and meaningless acronyms). I made a critique of it on this list 
recently. Outside of this critique is the (inconsequential) fact that they seem to use 
"1234" as the PIN for the smart cards (I got this fact from a glimpse at the 
real-time video of the key ceremony).

There is no PIN for the SMK shares. The is a PIN for the AAK share, but as we 
have other security controls to manage the risks that the PIN would mitigate 
(remembering that the PIN itself introduces some issues as well), we choose to 
not use it (or rather; use a fixed, known PIN).


Thanks for the clarification. Indeed, the choice not to use it (and not to apply PIN protection to the SMK shares by design) follows a logical set of usage assumptions.


One is the backup for long-term recovery capability. They rely on 5-of-7 
custodians spread across a few continents (ICANN needs to look like an 
international organization).

The other purpose was transient, for the duplication of signature capability from the "East 
coast facility" to the "West coast facility". In that case, they use something like 
2-of-3 (or 2-of-4) but they shipped the key share media (smart cards) and the HSM configuration 
file (yes, it *WAS* encrypted!! ) by means not subject to the same control/audit scrutiny as the 
rest of the procedure.

The above is actually the same very SMK, but the 2nd copy of the SMK shares 
(the one used for transporting the key material from the east to the west 
coast) was destroyed as part of the ceremony at the west coast (where the key 
from the east coast where restored). The 2nd copy of the SMK was generated 
using a 2 of 4 scheme.


If it leaked in transit, the destruction (electronic erasure followed by actual shredding of smart cards) is pointless. Otherwise, we seem to agree on the basic facts.

The couriered key material was indeed under the same control/audit scrutiny as 
the rest of the procedures, is was documented both in writing and by video. 
Anyone in doubt of what happened, how data was transported and what controls 
were in place to detect tampering and/or other threats, are more than welcome 
to contact me and I will try to answer any questions.


The very "couriered key material" was indeed created and used under these controls. My attention is focused on the courier *OPERATION* itself.

The offer to answer questions triggered a private e-mail to Jakob (but no genuine question). If anything new comes from this exchange, I will try to report to this same mailing list.


With the next key generation for DNS root KSK signature key, ICANN may have an 
opportunity to improve their procedure. However, at this point the project will 
be the focus of less attention, and the institutional commitment may not be as 
strong as it was for the first key generation.

We'd be happy to learn from your experience in this matter and will listen 
carefully to any feedback from the community. But before submitting comments, I 
do urge people to review the key ceremonies that took place on the east and 
west coast (audit material is available online at 
http://data.iana.org/ksk-ceremony/).


Understood.


        jakob



Regards,


--
- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, QC, Canada H2M 2A1

Tel. +1-514-385-5691

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com

Reply via email to