Randy,

On Monday, 2012-10-15 05:55:16 -1000, 
Randy Bush <ra...@psg.com> wrote:
> > A hardware HSM allows you to detect when your keys get stolen
> > (provided the hardware does not implement extraction of the keys, of
> > course).  In our case, this is the *only* reason we use a HSM at
> > all.
> 
> i keep wondering about the use of hsms in dnssec and rpki signing.  i
> suspect that the threat model is not well thought out.

The only attack that I could see an HSM protecting against is an
insider stealing the keys without being detected, like Alexander
mentioned. The idea is that a motivated attacker could in principle
make a copy of the keys - but not if they are stored in an HSM.

I can't see any other actual security added.

Also note that there are possible weaknesses with even an HSM, depending
on how backups are made. These can be worked around with procedure and
extra layers of security (cameras, access logs, ...).

Even trickier is to protect against an internal conspiracy, but I don't
think anyone is really seriously worried about that threat.

Cheers,

--
Shane
_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to