Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. This post did not contain any content.

This post did not contain any content.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 11 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • filippo@abyssdomain.expertF This user is from outside of this forum
    filippo@abyssdomain.expertF This user is from outside of this forum
    filippo@abyssdomain.expert
    wrote last edited by
    #1
    This post did not contain any content.
    benjojo@benjojo.co.ukB R erlenmayr@chaos.socialE rzeta0@mathstodon.xyzR D 5 Replies Last reply
    3
    0
    • filippo@abyssdomain.expertF filippo@abyssdomain.expert
      This post did not contain any content.
      benjojo@benjojo.co.ukB This user is from outside of this forum
      benjojo@benjojo.co.ukB This user is from outside of this forum
      benjojo@benjojo.co.uk
      wrote last edited by
      #2

      @filippo posting through the HSM adventures

      1 Reply Last reply
      0
      • filippo@abyssdomain.expertF filippo@abyssdomain.expert
        This post did not contain any content.
        R This user is from outside of this forum
        R This user is from outside of this forum
        risottobias@toot.risottobias.org
        wrote last edited by
        #3

        @filippo it is impossible 😮

        1 Reply Last reply
        0
        • filippo@abyssdomain.expertF filippo@abyssdomain.expert
          This post did not contain any content.
          erlenmayr@chaos.socialE This user is from outside of this forum
          erlenmayr@chaos.socialE This user is from outside of this forum
          erlenmayr@chaos.social
          wrote last edited by
          #4

          @filippo Worst absurdity are network-attached HSMs.

          tab2space@mastodon.socialT 1 Reply Last reply
          0
          • R relay@relay.mycrowd.ca shared this topic
          • filippo@abyssdomain.expertF filippo@abyssdomain.expert
            This post did not contain any content.
            rzeta0@mathstodon.xyzR This user is from outside of this forum
            rzeta0@mathstodon.xyzR This user is from outside of this forum
            rzeta0@mathstodon.xyz
            wrote last edited by
            #5

            @filippo

            sorry to be so ignorant but what is a HSM?

            is it a machine dedicated to doing cryptography?

            armb@infosec.exchangeA alilly@solarpunk.moeA 2 Replies Last reply
            0
            • filippo@abyssdomain.expertF filippo@abyssdomain.expert
              This post did not contain any content.
              D This user is from outside of this forum
              D This user is from outside of this forum
              divergentdave@infosec.exchange
              wrote last edited by
              #6

              @filippo trusted hardware, the refuge of insoluble problems https://chaos.social/@gsuberland/112341253188262230

              1 Reply Last reply
              0
              • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

                @filippo

                sorry to be so ignorant but what is a HSM?

                is it a machine dedicated to doing cryptography?

                armb@infosec.exchangeA This user is from outside of this forum
                armb@infosec.exchangeA This user is from outside of this forum
                armb@infosec.exchange
                wrote last edited by
                #7

                @rzeta0 @filippo
                Hardware Security Module.
                Box that does cryptography and keeps keys inside a box. If anyone in the world can use it for cryptography, it doesn't really make the keys more secure. If you need a key to prove you're a person allowed to use the box, you have to keep that key safe outside the box.
                And if you ask the box to sign things you didn't understand, none of it helps.
                https://en.wikipedia.org/wiki/Hardware_security_module

                poleguy@mastodon.socialP 1 Reply Last reply
                0
                • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

                  @filippo

                  sorry to be so ignorant but what is a HSM?

                  is it a machine dedicated to doing cryptography?

                  alilly@solarpunk.moeA This user is from outside of this forum
                  alilly@solarpunk.moeA This user is from outside of this forum
                  alilly@solarpunk.moe
                  wrote last edited by
                  #8

                  @rzeta0 @filippo A Hardware Security Module is a device that holds cryptographic keys and performs operations using them. Sort of like a super-smartcard?

                  1 Reply Last reply
                  0
                  • R relay@relay.an.exchange shared this topic
                  • erlenmayr@chaos.socialE erlenmayr@chaos.social

                    @filippo Worst absurdity are network-attached HSMs.

                    tab2space@mastodon.socialT This user is from outside of this forum
                    tab2space@mastodon.socialT This user is from outside of this forum
                    tab2space@mastodon.social
                    wrote last edited by
                    #9

                    @erlenmayr @filippo

                    Network-attached HSMs protect adequately against theft of hardware that involves cutting power to the host, so long as the multiple parties required for unlocking the HSM at startup can't be coerced into doing so with an XKCD 538 attack on themselves or loved ones.

                    😏

                    1 Reply Last reply
                    0
                    • armb@infosec.exchangeA armb@infosec.exchange

                      @rzeta0 @filippo
                      Hardware Security Module.
                      Box that does cryptography and keeps keys inside a box. If anyone in the world can use it for cryptography, it doesn't really make the keys more secure. If you need a key to prove you're a person allowed to use the box, you have to keep that key safe outside the box.
                      And if you ask the box to sign things you didn't understand, none of it helps.
                      https://en.wikipedia.org/wiki/Hardware_security_module

                      poleguy@mastodon.socialP This user is from outside of this forum
                      poleguy@mastodon.socialP This user is from outside of this forum
                      poleguy@mastodon.social
                      wrote last edited by
                      #10

                      @armb @rzeta0 @filippo So it's like a supercomputer: turns processor bound problems into io bound problems?

                      Except a networked HSM: turns a key security problem into multiple key security problems plus key exchange problems?

                      sai_peregrinus@defcon.socialS 1 Reply Last reply
                      0
                      • poleguy@mastodon.socialP poleguy@mastodon.social

                        @armb @rzeta0 @filippo So it's like a supercomputer: turns processor bound problems into io bound problems?

                        Except a networked HSM: turns a key security problem into multiple key security problems plus key exchange problems?

                        sai_peregrinus@defcon.socialS This user is from outside of this forum
                        sai_peregrinus@defcon.socialS This user is from outside of this forum
                        sai_peregrinus@defcon.social
                        wrote last edited by
                        #11

                        @poleguy @armb @rzeta0 @filippo It also adds some financial problems. HSMs aren't cheap. And you need ways to back up the keys securely, which means onto another HSM. Amazon's "CloudHSM" is $1.45/hour, and has the obvious security issue of being a fucking cloud service, if you want opex issues instead of just capex.

                        rzeta0@mathstodon.xyzR 1 Reply Last reply
                        0
                        • sai_peregrinus@defcon.socialS sai_peregrinus@defcon.social

                          @poleguy @armb @rzeta0 @filippo It also adds some financial problems. HSMs aren't cheap. And you need ways to back up the keys securely, which means onto another HSM. Amazon's "CloudHSM" is $1.45/hour, and has the obvious security issue of being a fucking cloud service, if you want opex issues instead of just capex.

                          rzeta0@mathstodon.xyzR This user is from outside of this forum
                          rzeta0@mathstodon.xyzR This user is from outside of this forum
                          rzeta0@mathstodon.xyz
                          wrote last edited by
                          #12

                          @SAI_Peregrinus @poleguy @armb @filippo

                          So after reading the replies I am concluding that:

                          1. A HSM can accelerate cryptography by doing it in hardware. I understand this is less of a unique selling point as modern computer hardware can do it in hardware too?

                          2. A HSM is a specialised environment unlike a general operating system, which reduces the attack surface to stored keys, and may have anti-attack measures to defend against attempts at compromise. A general "all-purpose" OS and hardware can't for example delete keys if it detects an attempt to read the data bus.

                          2a. But a compromised general purpose OS can still read message before encryption and after decryption because that general OS still has to process that data ?! So the security benefit is limited?

                          3. A HSM doesn't help the problem of getting keys into the device, nor the backup problem in general (non-general a vendor may have mechanism to back it up to another one of their own devices).

                          Is that a fair summary?

                          armb@infosec.exchangeA 1 Reply Last reply
                          0
                          • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

                            @SAI_Peregrinus @poleguy @armb @filippo

                            So after reading the replies I am concluding that:

                            1. A HSM can accelerate cryptography by doing it in hardware. I understand this is less of a unique selling point as modern computer hardware can do it in hardware too?

                            2. A HSM is a specialised environment unlike a general operating system, which reduces the attack surface to stored keys, and may have anti-attack measures to defend against attempts at compromise. A general "all-purpose" OS and hardware can't for example delete keys if it detects an attempt to read the data bus.

                            2a. But a compromised general purpose OS can still read message before encryption and after decryption because that general OS still has to process that data ?! So the security benefit is limited?

                            3. A HSM doesn't help the problem of getting keys into the device, nor the backup problem in general (non-general a vendor may have mechanism to back it up to another one of their own devices).

                            Is that a fair summary?

                            armb@infosec.exchangeA This user is from outside of this forum
                            armb@infosec.exchangeA This user is from outside of this forum
                            armb@infosec.exchange
                            wrote last edited by
                            #13

                            @rzeta0 @SAI_Peregrinus @poleguy @filippo
                            1. Some HSMs provide acceleration, but the main point is the security.
                            2. Yes
                            2a. The compromised OS with an HSM client can read and leak messages, but it can't leak the key (assuming the HSM has suitable permissions on the key).
                            Some HSMs have audit features so you can tell a signing key hasn't been used for unexpected signatures, for example.
                            3. Copying to another similar device is not the only possible backup mechanism, check the documentation of your HSM.

                            rzeta0@mathstodon.xyzR 1 Reply Last reply
                            0
                            • armb@infosec.exchangeA armb@infosec.exchange

                              @rzeta0 @SAI_Peregrinus @poleguy @filippo
                              1. Some HSMs provide acceleration, but the main point is the security.
                              2. Yes
                              2a. The compromised OS with an HSM client can read and leak messages, but it can't leak the key (assuming the HSM has suitable permissions on the key).
                              Some HSMs have audit features so you can tell a signing key hasn't been used for unexpected signatures, for example.
                              3. Copying to another similar device is not the only possible backup mechanism, check the documentation of your HSM.

                              rzeta0@mathstodon.xyzR This user is from outside of this forum
                              rzeta0@mathstodon.xyzR This user is from outside of this forum
                              rzeta0@mathstodon.xyz
                              wrote last edited by
                              #14

                              @armb @SAI_Peregrinus @poleguy @filippo

                              So getting keys into a HSM and configuring it must be done carefully a sanitised controlled environment.

                              I am starting to see how a HSM might fit into wider enterprise architecture now.

                              1 Reply Last reply
                              0
                              • R relay@relay.infosec.exchange shared this topic
                              Reply
                              • Reply as topic
                              Log in to reply
                              • Oldest to Newest
                              • Newest to Oldest
                              • Most Votes


                              • Login

                              • Login or register to search.
                              • First post
                                Last post
                              0
                              • Categories
                              • Recent
                              • Tags
                              • Popular
                              • World
                              • Users
                              • Groups