At 12:00 -0400 4/21/09, Andrew Sullivan wrote:
On Tue, Apr 21, 2009 at 11:45:18AM -0400, Edward Lewis wrote:
Suppose that I tightly constrain who reads the database.
Suppose you do. Then you still have the problem of escalation attacks.
HSMs are designed to make such attacks impossible: the key simply
won't come out. That's a better answer than, "I've set it up so that
just about nobody can get to the key", since privilege escalation in
database systems is exactly the place good attackers work. I notice
in passing that a certain large company who recently bought Sun no
longer makes "unbreakable" claims loudly and in public.
Hmmm, this doesn't apply... To be fair, I don't want to dive into
the details of what I see. Thus the justification of my reaction
here is not going to be convincing.
Trying to fudge around a bit for the justification, the database and
the key are not linked "in series", they are both are behind the some
of the same fortifications. "Breaking the database" security won't
make getting to the key any easier, i.e., the database does not
contain the information needed to access the key.
In a way, I figure - "if you can read my private key, I have larger
issues to deal with."
At the IEPG meeting in, umm, not SF, but in, umm, where was, oh,
Minneapolis, I mentioned that the "value in protecting the private
key is a function of the cost of rolling to a new key." If the key
is a SEP, it's the cost of rolling it through the trust anchor
repositories, if the key is a lowly ZSK, then it's more or less just
the liability for goofing up. It's not like someone reading the key
is going to unlock encrypted state secrets and such.
I should add too that the impact of someone reading the key and
someone reverse-engineering (guessing) the key is essentially the
same. The latter is a different cause though - "luck" or weak choice
of a key pair that succumbs to a key dictionary attack. (HSMs are
not there so much for that unless they have an enhanced way to choose
"random" numbers - which some do advertise.)
I guess the equation is - the cost of an HSM vs. the value of saving
one's operations from key "exposure." (Not the same as a forged
response.)
Sorry if it sounds like I'm just talking in circles. But I can't see
the very vulnerability that an HSM addresses as being likely enough
to be worth addressing given all the other vulnerabilities.
(Finally, my mantra here. HSMs are not total wastes. HSMs do add
value. But just not universally needed/incrementally valuable.)
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis
NeuStar You can leave a voice message at +1-571-434-5468
Getting everything you want is easy if you don't want much.
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop