> But the risk is not completely eliminated, since the usage of the HSM itself 
> may have become compromised. An attacker may have gained access to a system 
> with HSM access and issued malicious signatures. If this should happen, a key 
> replacement is most probably warranted.

Absolutely!  That said, I imagine any decent HSM can perform internal 
time-stamping, in which case only signatures before a certain point need to be 
invalidated.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/rpm-software-management/rpm/issues/1598#issuecomment-873998097
_______________________________________________
Rpm-maint mailing list
Rpm-maint@lists.rpm.org
http://lists.rpm.org/mailman/listinfo/rpm-maint

Reply via email to