On Tue, Apr 21, 2009 at 09:50:53PM +0200, Shane Kerr wrote:

> When we looked at the problem of disgruntled or bribed employees, HSM
> (or the equivalent) was the only logical answer. Otherwise the private
> key can be copied off, probably without your knowledge, by trusted staff.
> 
> Not necessary in all scenarios, clearly! But I think a paragraph or two
> in the RFC to alert people to the possibility makes sense.

in an attempt to summarize and give our editors some guidance, is it OK
to read

o the protection of the key against (unauthorized) copying should be
  weighed against the chance of detection, the remaining window of
  opportunity for the attacker and the "cost" of rolling the (compromised)
  key.

o the WG believes that the use of HSMs for DNSSEC KSKs is useful {is
  that useful as in "RECOMMENDED"?} for a certain type of zones ("high
  profile"?) to minimize the risk of an unnoticed key compromise (copy).

o HSMs for ZSKs might be less efficient (as in signatures/second) and
  effective, since the ease of automation generally preferred for this
  type makes the attacker's job easier (you might not be able to copy
  the key, but you might be able to get a valid signature on arbitrary data).

The term "HSM", though, doesn't imply any particular security level
unless some certification is provided.  If the WG would like to make
recommendations here, we should keep in mind who our target audiences are
and how to serve an international readership, especially if the to-be-BCP
should make it into or be referenced by some RFP type document.

-Peter
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to