1 |
On Mon, Aug 20, 2018 at 4:27 PM, Kristian Fiskerstrand <k_f@g.o> |
2 |
wrote: |
3 |
|
4 |
> On 08/20/2018 10:18 PM, Alec Warner wrote: |
5 |
> > Are there other ways to measure if the keys are used in the manner we are |
6 |
> > hoping for? |
7 |
> |
8 |
> Nope... additional complexity arise if multiple signing keys exists |
9 |
> (primary or subkeys), and furthermore there is no guarantee the key is |
10 |
> stored on key only. |
11 |
> |
12 |
|
13 |
> That said, the actual security is even further muddied by operational |
14 |
> security concerns regarding how the primary key is accessed even in the |
15 |
> event signing subkey is on card only.. and other security precations |
16 |
> required by the developers for the token to have any meaningful addition |
17 |
> to security as an attacker can anyways just wait for it to be be |
18 |
> available, in particular if not mandating forcesig on the openpgp applet |
19 |
> and counting the number of signatures manually to detect abnormalities. |
20 |
> |
21 |
|
22 |
I assert that the hardware token, when the key is stored only in the token |
23 |
and not in another place online, prevents export of key material. |
24 |
This limits attackers who instead of: |
25 |
|
26 |
- Getting on my box once and stealing my keys. |
27 |
- Now has to maintain persistence on the machine that my token is |
28 |
available on. |
29 |
- Add a hook to detect when the token is unlocked. |
30 |
- Do all the sign operations during the unlock window. |
31 |
- Avoid detection during all of this. |
32 |
|
33 |
Its certainly not impossible, but its harder than just key theft. Is it |
34 |
worth 4000$? Is the 4000 better spent on other controls? Unclear. |
35 |
|
36 |
-A |
37 |
|
38 |
|
39 |
> I really would like to see a properly written up memorandum on the |
40 |
> threat model this suggestion is intended to protect against and the |
41 |
> cost/benefit analysis involved in the decision making; to me it sounds |
42 |
> like some people think it is a panacea without much actual considerations. |
43 |
> |
44 |
> -- |
45 |
> Kristian Fiskerstrand |
46 |
> OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net |
47 |
> fpr:94CB AFDD 3034 5109 5618 35AA 0B7F 8B60 E3ED FAE3 |
48 |
> |
49 |
> |