On 4/26/17 12:03, Acee Lindem (acee) wrote:


From: Adam Roach <[email protected] <mailto:[email protected]>>
Date: Wednesday, April 26, 2017 at 12:46 PM
To: Eric Rescorla <[email protected] <mailto:[email protected]>>
Cc: Acee Lindem <[email protected] <mailto:[email protected]>>, The IESG <[email protected] <mailto:[email protected]>>, Jeff Tantsura <[email protected] <mailto:[email protected]>>, "[email protected] <mailto:[email protected]>" <[email protected] <mailto:[email protected]>>, "[email protected] <mailto:[email protected]>" <[email protected] <mailto:[email protected]>>, Routing WG <[email protected] <mailto:[email protected]>> Subject: Re: Adam Roach's No Objection on draft-ietf-rtgwg-yang-key-chain-20: (with COMMENT)

    On 4/25/17 18:29, Eric Rescorla wrote:


    On Tue, Apr 25, 2017 at 3:51 PM, Adam Roach <[email protected]
    <mailto:[email protected]>> wrote:



                - Section 5 also suggests keys be encrypted or
                obfuscated on the device
                that is to use them, presumably in a way that can be
                decrypted or
                unobfuscated using information also on the device. I
                don't know what the
                current security area thinking around this is, but
                given that the
                information needed to retrieve plaintext keys is
                necessarily present on
                the device, this seems like a fig-leaf that provides
                an illusion of
                security without providing any real benefit. That
                mis-impression seems
                potentially harmful.

            I only added this at the behest of one of the other
            reviews. The problem
            with security is that there conflicting opinions, and as
            the adage goes
            “everybody’s got one.” I’ll defer to the Security ADs.


        Right; that's what I meant by "I don't know what the current
        security area thinking around this is." I'd be curious to
        have EKR or Kathleen weigh in


    What I took home here was that you would encrypt them and display
    the encrypted
    version instead of showing asterisks. Is that not what the
    thinking was?

    By my reading, this is just talking about encrypting "on the disk"
    storage on the device. Any processes involved in provisioning the
    values or using them to process traffic would have access to the
    plaintext, presumably by reading the encrypted form off disk,
    reading some keying material off disk, and combining them to
    retrieve the plaintext key.


This is the correct interpretation.



    My concern is: if these process can extract the plaintext key from
    information stored on the disk, then so can other processes on the
    same device. Encryption in this case seems to provide the mere
    illusion of security -- akin to installing an deadbolt keyhole on
    a door that has no actual bolt attached.


I don’t see any way around this if you want to use the keys.

So don't encrypt the keys on disk. To use the analogy I set up above -- it's better for people to *know* that there's no deadbolt than to mistakenly think that there is one: it leads them to take an appropriate level of precaution.

/a
_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg

Reply via email to