On 4/26/17 12:03, Acee Lindem (acee) wrote:
From: Adam Roach <[email protected] <mailto:[email protected]>>
Date: Wednesday, April 26, 2017 at 12:46 PM
To: Eric Rescorla <[email protected] <mailto:[email protected]>>
Cc: Acee Lindem <[email protected] <mailto:[email protected]>>, The IESG
<[email protected] <mailto:[email protected]>>, Jeff Tantsura
<[email protected] <mailto:[email protected]>>,
"[email protected] <mailto:[email protected]>"
<[email protected] <mailto:[email protected]>>,
"[email protected]
<mailto:[email protected]>"
<[email protected]
<mailto:[email protected]>>, Routing WG
<[email protected] <mailto:[email protected]>>
Subject: Re: Adam Roach's No Objection on
draft-ietf-rtgwg-yang-key-chain-20: (with COMMENT)
On 4/25/17 18:29, Eric Rescorla wrote:
On Tue, Apr 25, 2017 at 3:51 PM, Adam Roach <[email protected]
<mailto:[email protected]>> wrote:
- Section 5 also suggests keys be encrypted or
obfuscated on the device
that is to use them, presumably in a way that can be
decrypted or
unobfuscated using information also on the device. I
don't know what the
current security area thinking around this is, but
given that the
information needed to retrieve plaintext keys is
necessarily present on
the device, this seems like a fig-leaf that provides
an illusion of
security without providing any real benefit. That
mis-impression seems
potentially harmful.
I only added this at the behest of one of the other
reviews. The problem
with security is that there conflicting opinions, and as
the adage goes
“everybody’s got one.” I’ll defer to the Security ADs.
Right; that's what I meant by "I don't know what the current
security area thinking around this is." I'd be curious to
have EKR or Kathleen weigh in
What I took home here was that you would encrypt them and display
the encrypted
version instead of showing asterisks. Is that not what the
thinking was?
By my reading, this is just talking about encrypting "on the disk"
storage on the device. Any processes involved in provisioning the
values or using them to process traffic would have access to the
plaintext, presumably by reading the encrypted form off disk,
reading some keying material off disk, and combining them to
retrieve the plaintext key.
This is the correct interpretation.
My concern is: if these process can extract the plaintext key from
information stored on the disk, then so can other processes on the
same device. Encryption in this case seems to provide the mere
illusion of security -- akin to installing an deadbolt keyhole on
a door that has no actual bolt attached.
I don’t see any way around this if you want to use the keys.
So don't encrypt the keys on disk. To use the analogy I set up above --
it's better for people to *know* that there's no deadbolt than to
mistakenly think that there is one: it leads them to take an appropriate
level of precaution.
/a
_______________________________________________
rtgwg mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/rtgwg