On Mon, Oct 15, 2018 at 4:33 PM robert engels <reng...@ix.netcom.com> wrote:
>
> To clarify, this is for a hardware device that protects a local resource - a 
> network based protocol that challenges the device for access is a different 
> story, and yes, when properly implemented is secure (unless someone steals 
> your device! - which is why it is usually password + device, and then you are 
> back to the same problem of compromising passwords when root access has been 
> compromised).

This statement indicates to me you don't understand how hardware
security tokens work. It doesn't matter if you have root access. You
cannot obtain key material from it. If you lose it, you lose the set
of keys on it. That's it. Revoke them and issue new ones using your
root cert/key that never touches a networked system and lives in a
safe.

-- 
Christopher Nielsen
"They who can give up essential liberty for temporary safety, deserve
neither liberty nor safety." --Benjamin Franklin
"The tree of liberty must be refreshed from time to time with the
blood of patriots & tyrants." --Thomas Jefferson

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to