> But the risk is not completely eliminated, since the usage of the HSM itself
> may have become compromised. An attacker may have gained access to a system
> with HSM access and issued malicious signatures. If this should happen, a key
> replacement is most probably warranted.
Absolutely! That said, I imagine any decent HSM can perform internal
time-stamping, in which case only signatures before a certain point need to be
invalidated.
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/rpm-software-management/rpm/issues/1598#issuecomment-873998097
_______________________________________________
Rpm-maint mailing list
Rpm-maint@lists.rpm.org
http://lists.rpm.org/mailman/listinfo/rpm-maint