In short, as I claim always, there is nothing good in PEM, because
you can't eat the cake and have it. You either have an un-encrypted
file, or you have an encrypted file - but with another program that
outputs this password. And you don't have to look for this program -
just look at the appropriate rc.d script...

A hacker can copy your key, no matter if it is encrypted or not; It
will just spend one more minute for him.

The only use for this PEM, is when it is transferred via non-secure
ways, for example when it is e-mailed, or stored in another computer.

Or may I miss anything?
-- 
Eli Marmor
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to