Hi Mike (and all). Thanks for the info. I understand the implications of storing the randomized data to storage and precautions would be taken to air-gap this info from the outside world.
> If not, you can use the TRNG for all newly issued certificates moving forward. Can you pease syntax? I have googled but I’m unclear if this would be with -rand flag, or setting the RANDFILE variable, or something else. Provided the randomized numbers are in a binary file, can you advise how to use this file for the generation of future keys/certs from the existing CA. Thank you > On Sep 3, 2015, at 2:23 AM, Mike Mohr <akih...@gmail.com> wrote: > > Once you've written the random data to secondary storage you've permanently > compromised the integrity of any cryptographic secrets generated from it. > Depending on your threat model, underlying storage media, filesystem, and > other factors the data files may be recoverable indefinitely (especially if > you're using solid-state disks, due to their internal wear-leveling > algorithms). Don't do that. > > The cryptographic secrets contained in your existing CA infrastructure were > presumably generated using some sort of PRNG, so you'd have to regenerate > them if you think the PRNG was somehow compromised. If not, you can use the > TRNG for all newly issued certificates moving forward. However, I'd suggest > not using one of the proprietary devices which are encased in epoxy ... you > have no way to verify that they're doing what they say they are. The data > quality coming out of those is fairly suspect in my mind (despite any > positive results from e.g. dieharder, etc). > > On Wed, Sep 2, 2015 at 9:53 PM, Kevin Long <kevinlong...@gmail.com > <mailto:kevinlong...@gmail.com>> wrote: > > > Hello, > > I’m using openssl to administer a root/intermediate CA and I use the > certificates for a number of web servers and other applications. All of my > users install my root CA certificate for trust. > > I’ve been asked to use a hardware random number generator to create the > keys/certificates going forward. I have a hardware RNG, and have created > several files of random numbers using it, and I would like to know: > > 1) Can I specify my random numbers file to create keys/certificates from my > CA (openssl command line, mac or linux) > > 2) Will this actually do any good, security wise, given how openssl > certs/keys “work”. My users and superiors are concerned with backdoors in > PRNGs and RNG predictabilities. > > 3) If I can indeed use my own random numbers, does this mean I have to start > my CA from scratch to take advantage of any benefit using “true” random > numbers from my hardware RNG? or would simply using my RN’s for the > generation of keys for new certificates going forward allow for the benefit > the true randomness gives. > > Thank you. > _______________________________________________ > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users > <https://mta.openssl.org/mailman/listinfo/openssl-users> > > _______________________________________________ > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
_______________________________________________ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users