Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt

Andrew Sullivan <ajs@shinkuro.com> Tue, 21 April 2009 18:08 UTC

Return-Path: <ajs@shinkuro.com>
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 08BD83A6C2C for <dnsop@core3.amsl.com>; Tue, 21 Apr 2009 11:08:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.19
X-Spam-Level:
X-Spam-Status: No, score=-2.19 tagged_above=-999 required=5 tests=[AWL=0.409, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OrundfpBXsmb for <dnsop@core3.amsl.com>; Tue, 21 Apr 2009 11:08:13 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by core3.amsl.com (Postfix) with ESMTP id 3C23E3A69C6 for <dnsop@ietf.org>; Tue, 21 Apr 2009 11:08:13 -0700 (PDT)
Received: from crankycanuck.ca (CPE00212980eb9c-CM00194757af08.cpe.net.cable.rogers.com [99.249.242.212]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 29A562FE9583 for <dnsop@ietf.org>; Tue, 21 Apr 2009 18:09:29 +0000 (UTC)
Date: Tue, 21 Apr 2009 14:09:27 -0400
From: Andrew Sullivan <ajs@shinkuro.com>
To: dnsop@ietf.org
Message-ID: <20090421180927.GG64986@shinkuro.com>
References: <20090306141501.4BA2F3A6B4B@core3.amsl.com> <49EDA81E.2000600@ca.afilias.info> <a06240805c6138a622949@[10.31.200.142]> <82iqkykq10.fsf@mid.bfk.de> <a06240807c61393343ac7@[10.31.200.142]> <20090421153213.GA7564@nic.fr> <a06240808c61397d750db@[10.31.200.142]> <20090421160040.GD64986@shinkuro.com> <a06240800c613abf111de@[10.31.200.142]>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <a06240800c613abf111de@[10.31.200.142]>
User-Agent: Mutt/1.5.18 (2008-05-17)
Subject: Re: [DNSOP] HSMs was Re: I-D Action:draft-ietf-dnsop-rfc4641bis-01.txt
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Apr 2009 18:08:14 -0000

On Tue, Apr 21, 2009 at 01:22:01PM -0400, Edward Lewis wrote:

> same fortifications.  "Breaking the database" security won't make getting 
> to the key any easier, i.e., the database does not contain the 
> information needed to access the key.

If the database does not contain the information needed to access the
key -- which actually means "does not contain the key", since if the
database contains the key it contains the information needed to access
the key -- then you have just built your own HSM-like device (except
that it implements some of the components in software instead).  Now
your only problem is trying to prove that your system is as secure as
the alternative, which is just buying an HSM.  HSMs aren't just
expensive because of the unusual hardware they contain.  The testing
of them to prove they meet all those big standards most of us haven't
read is expensive and time consuming (and risky, if you find your
device fails).

If the database _does_ contain the key, then the only question is
whether there is an escalation attack that can get an attacker the
privileges needed to access the key.  One such escalation attack, of
course, is "get hired and have access to the superuser account."  I'm
aware of how the accounting systems catch such access.  I'm also aware
of how such access accounting breaks down.

Anyway, I completely agree that this is a cost-benefit analysis that
different sites have to do based on their use cases.

A

-- 
Andrew Sullivan
ajs@shinkuro.com
Shinkuro, Inc.