On Aug 20, 2008, at 12:34 PM, Igor Hernandez wrote:

> Hey SIP,
>
> I understand what you're saying but keeping the key in memory
> permanently doesn't protect you for very long, it just makes the
> attacker waste a bit more time scanning the memory to get at the key.
>
> In other words, if the key is available to asterisk it will be  
> available
> to anyone else in the system with sufficient privileges.
>

Assume I'm using a FIPS 140-2 Level 4 HSM, now, how can I protect my  
passwords when they are in the database?

--
Eric Chamberlain
Founder
RF.com
http://RF.com/







_______________________________________________
-- Bandwidth and Colocation Provided by http://www.api-digital.com --

AstriCon 2008 - September 22 - 25 Phoenix, Arizona
Register Now: http://www.astricon.net

asterisk-users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to