I think it would depend on the HSMs. In at least some of them, it's the card keys that are important and you could have a disjoint set of card keys for K_{n+1}
-Ekr On Mon, Oct 4, 2010 at 7:52 AM, Paul Hoffman <paul.hoff...@vpnc.org> wrote: > At 7:31 AM -0700 10/4/10, Eric Rescorla wrote: > >On Sun, Oct 3, 2010 at 10:54 AM, Joe Abley <<mailto:jab...@hopcount.ca> > jab...@hopcount.ca> wrote: > > > > > >On 2010-10-03, at 13:31, Eric Rescorla wrote: > > > >> I'm asking because I'm pretty familiar with cryptography and I know that > keys don't suddenly become > >> worthless just because they get past their intended use lifetime. The > semantics of signature > >> security of old keys is a lot more complicated than that. > > > >The context here is the publication of DNSSEC trust anchors for the root > zone. > > > >At least some of the cases we're talking about involve signatures > necessarily made by keys after an emergency key roll which has taken place > because the old key has been compromised. Such signatures are worthless. > > > > > >I don't think this follows. > > > >It's pretty commonly suggested that at the time you roll out key K_n you > also *immediately* generate > >key K_{n+1} and produce a certificate signing K_{n+1} with K_n. Since all > that is required for security > >is that the signature itself take place prior to the compromise of K_n > this allows for rollover even > >if K_n is subsequently compromised, provided that the relying party can > verify that the signature > >on K_{n+1} was computed before the compromise date. There are a variety of > techniques for > >doing this, e.g., hash commitment, Haber-Stornetta timestamping, etc. > > Does the "create your next key immediately" process work with HSMs if you > don't have 2x the number you would normally have in production? I'm no fan > of HSMs for a system like DNSSE that often needs operational agility, but it > seems like I'm in the minority here. > > --Paul Hoffman, Director > --VPN Consortium >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop