1 |
On Tue, 2018-08-21 at 02:26 +0300, Andrew Savchenko wrote: |
2 |
> On Mon, 20 Aug 2018 16:57:52 -0400 Alec Warner wrote: |
3 |
> > On Mon, Aug 20, 2018 at 4:27 PM, Kristian Fiskerstrand <k_f@g.o> |
4 |
> > wrote: |
5 |
> > |
6 |
> > > On 08/20/2018 10:18 PM, Alec Warner wrote: |
7 |
> > > > Are there other ways to measure if the keys are used in the manner we are |
8 |
> > > > hoping for? |
9 |
> > > |
10 |
> > > Nope... additional complexity arise if multiple signing keys exists |
11 |
> > > (primary or subkeys), and furthermore there is no guarantee the key is |
12 |
> > > stored on key only. |
13 |
> > > |
14 |
> > > That said, the actual security is even further muddied by operational |
15 |
> > > security concerns regarding how the primary key is accessed even in the |
16 |
> > > event signing subkey is on card only.. and other security precations |
17 |
> > > required by the developers for the token to have any meaningful addition |
18 |
> > > to security as an attacker can anyways just wait for it to be be |
19 |
> > > available, in particular if not mandating forcesig on the openpgp applet |
20 |
> > > and counting the number of signatures manually to detect abnormalities. |
21 |
> > > |
22 |
> > |
23 |
> > I assert that the hardware token, when the key is stored only in the token |
24 |
> > and not in another place online, prevents export of key material. |
25 |
> |
26 |
> No, it doesn't. The cost of extracting a key from a stolen token is |
27 |
> approximately $1000 depending on a token model. |
28 |
|
29 |
What is the cost of extracting a key from a stolen hard drive? |
30 |
|
31 |
What are the costs of other attack vectors on Gentoo, for comparison? |
32 |
|
33 |
-- |
34 |
Best regards, |
35 |
Michał Górny |