On Wed, Apr 26, 2000 at 02:46:19PM -0500, Leland V. Lammert wrote:
> At 12:53 PM 4/26/00, you wrote:
> 
> >Of course, nothing is as secure as a human being typing the passphrase in
> >at startup, but we've established that that is too much like hard work :).
> 
> Sorry, .. but you missed the point. If you are rebooting a server:
> 
> 1) In many cases the person doing the rebooting does not have root access, ..
> much less knowledge OF the pass phrase!
> 
> 2) In many other cases, the reboot is done remotely.
> 
> 3) In both cases above, the server  would HANG on reboot awaiting a
> passphrase.
> 
> 3) In 95% of the other cases, nobody is going to the trouble to write a C
> program just to enter the passphrase.
> 
> 4) A passphrase on a server doesn't really matter anyway, .. since if the
> machine is setup correctly only the SysAdmin has access to the directory with
> the key.
> 
> In reality, passphrases are only applicable on user-level machines.

What you're essentially saying is that keying in the passphrase is too
much trouble.

That all depends on how important it is to you that the private key remains
uncompromised.

Points 1-3a are hurdles, and they're all part of what makes security 
expensive and troublesome. They're hurdles that can be jumped though; there
are plentiful secure ways to remotely admin a machine; if you care enough
about the passphrase not being compromised, pay two people to be on
reboot duty 24/7. That level of security costs money. You might not value
the data highly enough to warrant such paranoia, but the option is there.

Point 3b: That "trouble" might be necessary. It's less trouble than (say)
the authors of OpenSSL went to in writing the thing in the first place.

Point 4 scares the bejesus out of me. "If the machine is set up correctly" is
a MAJOR assumption. However carefully you lock a machine down, there's a 
possibility, however small, that there's a way in. Every program, every
OS, has exploits discovered every day. If a cracker gets onto your server,
they may get hold of some valuable data -- then when you detect them, they'll
stop --  but if they get your private key they can continue gathering 
private data undetected for as long as you continue using that key pair
(beyond the lifetime of your certificate, in all likelihood). 

That private key is the single most valuable piece of data on the server.
It is a single point of failure in your security scheme. For every application,
a different value can be placed on it; that value will influence how much
inconvenience your organisation is prepared to go through in order to
protect it.

-- 
-------------------------------------------------------------------------------
                 "(The Mk 2 only reached prototype stage
           and was abandoned due to a design fault in the hull)"
-------------------------------------------------------------------------------

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to