> No, my risk model is to simply ascertain whether distributing the certs
> as files in the application directory is a serious security risk or not
> and, if it is, what steps can make it less so.

If it's a security risk, it's because something is broken someplace else.
Why do you need to hide a customer's own certificates from that customer?
Presumably, the certificate only permits the customer to do things the
customer is authorized to do.

If the customer's cert lets the customer do something the customer is not
allowed to do, then something is broken elsewhere.

> > This will not keep a cryptographer out of your application, but should
> > pass the "warm and fuzzy" test.

> It may make it harder for a disruptive hacker.

How would a hacker be able to disprut anything by obtaining normal user
access? If normal user access permits disruption, you have a design flaw.

> Whether this extra processing is really necessary, good security, or
> "security theatre" as another respondent on this thread claims, I am
> really not sure. But that is why I posted my OP, to see what others
> think and how others handled the situation.
>
> Thanks !

If it's necessary, it's inadequate. An ordinary user should only be
permitted to do those things you wish to allow that user to do. So an
ordinary user getting access to his own credentials should not pose a
security risk.

DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to