* Michael S. Zick wrote on Wed, Jul 15, 2009 at 07:38 -0500:
> You can approximate that by grabbing the processor's silicon
> serial number plus grab the USB stick's silicon serial number
> plus a user input (partial) passphrase.

I assume a good virtualisation (maybe some patched VMWare or
alike) allows to easily bypass this.

Also, the OP wrote:

  `what if the agent takes the network card out and plug into his home PC'

so here we need to raise the question if the agent takes out the CPU 
and plug into his home PC.

> I.E: The files can't be copied to a different USB device (and still work);
> The USB device must be installed on the same computer;
> The user must provide the "secret" part of the passphrase.

I don't have information how this is implemented, but I doubt
that it cannot be attacked by virtualization and debuggers...
(in other words, I'm afraid that this and several other proposals
 are `security through obscurity' only).

oki,

Steffen


























--[ end of message ]---------------------------------------------->8=======


 
About Ingenico: Ingenico is the world’s leading provider of payment solutions, 
with over 15 million terminals deployed across the globe. Delivering the very 
latest secure electronic payment technologies, transaction management and the 
widest range of value added services, Ingenico is shaping the future direction 
of the payment solutions market. Leveraging on its global presence and local 
expertise, Ingenico is reinforcing its leadership by taking banks and 
businesses beyond payment through offering comprehensive solutions, a true 
source of differentiation and new revenues streams.
 This message may contain confidential and/or privileged information. If you 
are not the addressee or authorized to receive this for the addressee, you must 
not use, copy, disclose or take any action based on this message or any 
information herein. If you have received this message in error, please advise 
the sender immediately by reply e-mail and delete this message. Thank you for 
your cooperation.
 P Please consider the environment before printing this e-mail
 
 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to