Where exactly am I speculating?

Am 17.10.2013 um 01:07 schrieb Phillip Hallam-Baker <[email protected]>:

> On Wed, Oct 16, 2013 at 5:26 PM, Oliver Loch <[email protected]> wrote:
> 
>> Hi,
>> 
>> these devices are nothing else than a modified server that runs some
>> special OS or services on them. The keys are stored inside and can be
>> transferred for backup- or clustering reasons. So there are at least two
>> ways to get your fingers on those keys. Even if they are still encrypted.
>> The password for decryption needs to be known to be able to restore the
>> backup on a vanilla system (and I don't think all systems of one vendor use
>> the same password on all of them and for every backup).
>> 
>> I also think that bigger CAs have multiple devices in at least two
>> different locations to prevent any kind of physical damage to the CA like
>> fire, power outage, missiles from NSA drones (ok, I admit the last one is a
>> bit sci-fi, isn't it?).
>> 
> 
> Rather than speculate, try reading the Certificate Practices Statements of
> the CAs. They all describe how the private keys are managed.
> 
> Each HSM vendor has their own security controls but a FIPS140 level 4
> device won't release them except to another FIPS-140 device. There is no
> way to extract the key from the system unencrypted.
> 
> 
> -- 
> Website: http://hallambaker.com/
> _______________________________________________
> dev-security-policy mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-security-policy

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to