> If you need a lot of hits/sec (a smart card can't handle
> many) you can use a hardware accelerator like the Ncipher
> (what I'm using) or Rainbow accelerators
and now I'm lost again. Surely the certificate only needs to
be loaded (and therefore the passphrase needs to be entered)
*once* after Apache startup ? Are you saying it has to be
loaded every time the server gets a hit from a browser!!???!?!
The server has to use the secret key to decrypt the user packet
every time an SSL connection starts. There are three levels of
securing the secret key:
1. Just store it on the server, unencrypted, so the server can
restart unattended. Someone who can get a backup tape of the
server now has the private key.
2. Don't store it unencrypted on the server, but load it into the
server on startup, either from external hardware or by decrypting
an encrypted file with a password. Once the server is running,
it has the private key in memory and can use it to start SSL
connections. Someone who can modify the server software, etc.,
can get the key out. That means you have to trust the site operators.
3. Don't ever let the server see the secret key. The secret key is
encapsulated in tamper resistant hardware that does the whole
RSA calculation. That means the secure hardware has to be fast
enough to process all the hits. This is what I'm talking about
w.r.t. the Ncipher and similar devices. They use special purpose
hardware to do the secret key much faster than most computers can.
Even if someone steals the hardware (you'll know right away that
they did this because your server can't run without it), they won't
be able to get the keys out without extremely sophisticated laboratory
attacks.
For many applications, level 1 or level 2 is good enough. It's a
cost versus security decision you have to make depending on what
you're trying to protect, how vulnerable your site is, how motivated
the attackers you're expecting are, etc. Typical web retailers don't
have to worry this too much, but some parts of the financial sector
are VERY paranoid about these things.
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]