>> Making a tamper-evident box with SoftHSM is (I think) much easier to
>> do, more scalable and done quicker.
> Right. I think that one question has not been asked so far: why? What's
> the real benefit that you'd get out of this?

sounds like a diy hsm to me.

and i still want to understand the threat model motivating hsm use in
dnssec and rpki signing.

randy
_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to