From: [email protected] [mailto:[email protected]] On 
Behalf Of Daniel Wolf
Sent: Friday, 7 November 2014 5:29 AM
To: [email protected]
Subject: RE: [NTSysADM] Has anyone implemented this solution?

>>And then, how are you going to store the private key securely? All you’ve 
>>done is
>>move what needs to be protected from the text file to the private key.
>
> Yes, but don’t all authorization/cryptographic issues reduce to protecting a 
> private key/secret?

Sure – and there are ways (some better than others) to do that. I don’t see 
anything in your proposed solution that does anything except shift the target. 
The target itself isn’t protected any better.

>> I wasn’t clear – the private key would not be on the server, instead shared 
>> directly on
>> technician computers. And the private key would be password-protected, as 
>> well.

So, instead of being stored on a centralized, protected piece of 
infrastructure, it’s now going to be shared peer-to-peer?

And now you have a password for the key? So, how are you going to protect this 
password? Maybe put it in a text file, encrypted with PKI, and the private key 
for that is password protected? ☺

Do you see what I’m trying to get at here? You haven’t meaningfully protected 
the “keys to the kingdom” – anyone who has the password then has access to the 
key, which then has access to the text file.

Cheers
Ken

Reply via email to