[Cryptography] HSM's to be required for Code Signing Certificates
Ron Garret
ron at flownet.com
Fri Jan 27 16:03:50 EST 2017
On Jan 27, 2017, at 12:52 AM, Peter Gutmann <pgut001 at cs.auckland.ac.nz> wrote:
> Natanael <natanael.l at gmail.com> writes:
>
>> Program the HSM to only accept customer requests that are signed by their
>> trusted keys, or sent over a trusted channel directly to the HSM. Any
>> overrides by the cloud company MUST be logged and audited by an independent
>> entity (such as if the customer reports they lost the authentication key).
>
> That's not how HSM's work though. The interface to an HSM, at least for
> signing purposes, is "perform a private-key operation on this short byte
> string" (a.k.a. "sign this hash"). That's it. Using an HSM merely moves the
> key from a potentially attacker-controlled PC to an external crypto box that
> does anything the attacker-controlled PC wants. It's perfect for auditing
> compliance because you can point to a physical artefact that contains the key,
> but only offers a marginal increase in actual security.
Unless the HSM has its own I/O, like this one:
https://sc4.us/hsm
When asked to sign, the SC4-HSM displays the hash to be signed on the built-in display and waits for the user to confirm by pressing a button on the HSM.
(Disclosure: this is my product.)
rg
More information about the cryptography
mailing list