Hi,

these devices are nothing else than a modified server that runs some special OS 
or services on them. The keys are stored inside and can be transferred for 
backup- or clustering reasons. So there are at least two ways to get your 
fingers on those keys. Even if they are still encrypted. The password for 
decryption needs to be known to be able to restore the backup on a vanilla 
system (and I don't think all systems of one vendor use the same password on 
all of them and for every backup).

I also think that bigger CAs have multiple devices in at least two different 
locations to prevent any kind of physical damage to the CA like fire, power 
outage, missiles from NSA drones (ok, I admit the last one is a bit sci-fi, 
isn't it?).

But let's assume you are not able to get the key out there in any way not even 
for backups. NSA gets a connection to the CA, gets their own device and puts 
that online in the cluster. Problem solved.

And shutting up people? I don't think this subjects needs any kind of further 
explanation, does it?

KR,

Oliver


Am 16.10.2013 um 15:42 schrieb Gervase Markham <[email protected]>:

> On 15/10/13 16:00, Oliver Loch wrote:
>> Based on the sentences people are facing - if they start talking to
>> the public - it's really possible that the hand full of people that
>> know that their company handed out the root cert's private key are
>> keeping their mouth shut. 
> 
> It's not like the root cert private key is a random file on disk that
> can be copied onto a USB stick. They are kept in Hardware Security
> Modules (HSMs) whose role is to allow certs to be signed but not to let
> the private key leak out.
> 
> https://en.wikipedia.org/wiki/Hardware_Security_Module
> 
> Not to say that there's never a way around this, but it's not as simple
> as you make it sound.
> 
> Gerv
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to