On Wed, Oct 16, 2013 at 5:26 PM, Oliver Loch <[email protected]> wrote:

> Hi,
>
> these devices are nothing else than a modified server that runs some
> special OS or services on them. The keys are stored inside and can be
> transferred for backup- or clustering reasons. So there are at least two
> ways to get your fingers on those keys. Even if they are still encrypted.
> The password for decryption needs to be known to be able to restore the
> backup on a vanilla system (and I don't think all systems of one vendor use
> the same password on all of them and for every backup).
>
> I also think that bigger CAs have multiple devices in at least two
> different locations to prevent any kind of physical damage to the CA like
> fire, power outage, missiles from NSA drones (ok, I admit the last one is a
> bit sci-fi, isn't it?).
>

Rather than speculate, try reading the Certificate Practices Statements of
the CAs. They all describe how the private keys are managed.

Each HSM vendor has their own security controls but a FIPS140 level 4
device won't release them except to another FIPS-140 device. There is no
way to extract the key from the system unencrypted.


-- 
Website: http://hallambaker.com/
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to