Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. This post did not contain any content.

This post did not contain any content.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 11 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • filippo@abyssdomain.expertF filippo@abyssdomain.expert
    This post did not contain any content.
    benjojo@benjojo.co.ukB This user is from outside of this forum
    benjojo@benjojo.co.ukB This user is from outside of this forum
    benjojo@benjojo.co.uk
    wrote last edited by
    #2

    @filippo posting through the HSM adventures

    1 Reply Last reply
    0
    • filippo@abyssdomain.expertF filippo@abyssdomain.expert
      This post did not contain any content.
      R This user is from outside of this forum
      R This user is from outside of this forum
      risottobias@toot.risottobias.org
      wrote last edited by
      #3

      @filippo it is impossible 😮

      1 Reply Last reply
      0
      • filippo@abyssdomain.expertF filippo@abyssdomain.expert
        This post did not contain any content.
        erlenmayr@chaos.socialE This user is from outside of this forum
        erlenmayr@chaos.socialE This user is from outside of this forum
        erlenmayr@chaos.social
        wrote last edited by
        #4

        @filippo Worst absurdity are network-attached HSMs.

        tab2space@mastodon.socialT 1 Reply Last reply
        0
        • R relay@relay.mycrowd.ca shared this topic
        • filippo@abyssdomain.expertF filippo@abyssdomain.expert
          This post did not contain any content.
          rzeta0@mathstodon.xyzR This user is from outside of this forum
          rzeta0@mathstodon.xyzR This user is from outside of this forum
          rzeta0@mathstodon.xyz
          wrote last edited by
          #5

          @filippo

          sorry to be so ignorant but what is a HSM?

          is it a machine dedicated to doing cryptography?

          armb@infosec.exchangeA alilly@solarpunk.moeA 2 Replies Last reply
          0
          • filippo@abyssdomain.expertF filippo@abyssdomain.expert
            This post did not contain any content.
            D This user is from outside of this forum
            D This user is from outside of this forum
            divergentdave@infosec.exchange
            wrote last edited by
            #6

            @filippo trusted hardware, the refuge of insoluble problems https://chaos.social/@gsuberland/112341253188262230

            1 Reply Last reply
            0
            • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

              @filippo

              sorry to be so ignorant but what is a HSM?

              is it a machine dedicated to doing cryptography?

              armb@infosec.exchangeA This user is from outside of this forum
              armb@infosec.exchangeA This user is from outside of this forum
              armb@infosec.exchange
              wrote last edited by
              #7

              @rzeta0 @filippo
              Hardware Security Module.
              Box that does cryptography and keeps keys inside a box. If anyone in the world can use it for cryptography, it doesn't really make the keys more secure. If you need a key to prove you're a person allowed to use the box, you have to keep that key safe outside the box.
              And if you ask the box to sign things you didn't understand, none of it helps.
              https://en.wikipedia.org/wiki/Hardware_security_module

              poleguy@mastodon.socialP 1 Reply Last reply
              0
              • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

                @filippo

                sorry to be so ignorant but what is a HSM?

                is it a machine dedicated to doing cryptography?

                alilly@solarpunk.moeA This user is from outside of this forum
                alilly@solarpunk.moeA This user is from outside of this forum
                alilly@solarpunk.moe
                wrote last edited by
                #8

                @rzeta0 @filippo A Hardware Security Module is a device that holds cryptographic keys and performs operations using them. Sort of like a super-smartcard?

                1 Reply Last reply
                0
                • R relay@relay.an.exchange shared this topic
                • erlenmayr@chaos.socialE erlenmayr@chaos.social

                  @filippo Worst absurdity are network-attached HSMs.

                  tab2space@mastodon.socialT This user is from outside of this forum
                  tab2space@mastodon.socialT This user is from outside of this forum
                  tab2space@mastodon.social
                  wrote last edited by
                  #9

                  @erlenmayr @filippo

                  Network-attached HSMs protect adequately against theft of hardware that involves cutting power to the host, so long as the multiple parties required for unlocking the HSM at startup can't be coerced into doing so with an XKCD 538 attack on themselves or loved ones.

                  😏

                  1 Reply Last reply
                  0
                  • armb@infosec.exchangeA armb@infosec.exchange

                    @rzeta0 @filippo
                    Hardware Security Module.
                    Box that does cryptography and keeps keys inside a box. If anyone in the world can use it for cryptography, it doesn't really make the keys more secure. If you need a key to prove you're a person allowed to use the box, you have to keep that key safe outside the box.
                    And if you ask the box to sign things you didn't understand, none of it helps.
                    https://en.wikipedia.org/wiki/Hardware_security_module

                    poleguy@mastodon.socialP This user is from outside of this forum
                    poleguy@mastodon.socialP This user is from outside of this forum
                    poleguy@mastodon.social
                    wrote last edited by
                    #10

                    @armb @rzeta0 @filippo So it's like a supercomputer: turns processor bound problems into io bound problems?

                    Except a networked HSM: turns a key security problem into multiple key security problems plus key exchange problems?

                    sai_peregrinus@defcon.socialS 1 Reply Last reply
                    0
                    • poleguy@mastodon.socialP poleguy@mastodon.social

                      @armb @rzeta0 @filippo So it's like a supercomputer: turns processor bound problems into io bound problems?

                      Except a networked HSM: turns a key security problem into multiple key security problems plus key exchange problems?

                      sai_peregrinus@defcon.socialS This user is from outside of this forum
                      sai_peregrinus@defcon.socialS This user is from outside of this forum
                      sai_peregrinus@defcon.social
                      wrote last edited by
                      #11

                      @poleguy @armb @rzeta0 @filippo It also adds some financial problems. HSMs aren't cheap. And you need ways to back up the keys securely, which means onto another HSM. Amazon's "CloudHSM" is $1.45/hour, and has the obvious security issue of being a fucking cloud service, if you want opex issues instead of just capex.

                      rzeta0@mathstodon.xyzR 1 Reply Last reply
                      0
                      • sai_peregrinus@defcon.socialS sai_peregrinus@defcon.social

                        @poleguy @armb @rzeta0 @filippo It also adds some financial problems. HSMs aren't cheap. And you need ways to back up the keys securely, which means onto another HSM. Amazon's "CloudHSM" is $1.45/hour, and has the obvious security issue of being a fucking cloud service, if you want opex issues instead of just capex.

                        rzeta0@mathstodon.xyzR This user is from outside of this forum
                        rzeta0@mathstodon.xyzR This user is from outside of this forum
                        rzeta0@mathstodon.xyz
                        wrote last edited by
                        #12

                        @SAI_Peregrinus @poleguy @armb @filippo

                        So after reading the replies I am concluding that:

                        1. A HSM can accelerate cryptography by doing it in hardware. I understand this is less of a unique selling point as modern computer hardware can do it in hardware too?

                        2. A HSM is a specialised environment unlike a general operating system, which reduces the attack surface to stored keys, and may have anti-attack measures to defend against attempts at compromise. A general "all-purpose" OS and hardware can't for example delete keys if it detects an attempt to read the data bus.

                        2a. But a compromised general purpose OS can still read message before encryption and after decryption because that general OS still has to process that data ?! So the security benefit is limited?

                        3. A HSM doesn't help the problem of getting keys into the device, nor the backup problem in general (non-general a vendor may have mechanism to back it up to another one of their own devices).

                        Is that a fair summary?

                        armb@infosec.exchangeA 1 Reply Last reply
                        0
                        • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

                          @SAI_Peregrinus @poleguy @armb @filippo

                          So after reading the replies I am concluding that:

                          1. A HSM can accelerate cryptography by doing it in hardware. I understand this is less of a unique selling point as modern computer hardware can do it in hardware too?

                          2. A HSM is a specialised environment unlike a general operating system, which reduces the attack surface to stored keys, and may have anti-attack measures to defend against attempts at compromise. A general "all-purpose" OS and hardware can't for example delete keys if it detects an attempt to read the data bus.

                          2a. But a compromised general purpose OS can still read message before encryption and after decryption because that general OS still has to process that data ?! So the security benefit is limited?

                          3. A HSM doesn't help the problem of getting keys into the device, nor the backup problem in general (non-general a vendor may have mechanism to back it up to another one of their own devices).

                          Is that a fair summary?

                          armb@infosec.exchangeA This user is from outside of this forum
                          armb@infosec.exchangeA This user is from outside of this forum
                          armb@infosec.exchange
                          wrote last edited by
                          #13

                          @rzeta0 @SAI_Peregrinus @poleguy @filippo
                          1. Some HSMs provide acceleration, but the main point is the security.
                          2. Yes
                          2a. The compromised OS with an HSM client can read and leak messages, but it can't leak the key (assuming the HSM has suitable permissions on the key).
                          Some HSMs have audit features so you can tell a signing key hasn't been used for unexpected signatures, for example.
                          3. Copying to another similar device is not the only possible backup mechanism, check the documentation of your HSM.

                          rzeta0@mathstodon.xyzR 1 Reply Last reply
                          0
                          • armb@infosec.exchangeA armb@infosec.exchange

                            @rzeta0 @SAI_Peregrinus @poleguy @filippo
                            1. Some HSMs provide acceleration, but the main point is the security.
                            2. Yes
                            2a. The compromised OS with an HSM client can read and leak messages, but it can't leak the key (assuming the HSM has suitable permissions on the key).
                            Some HSMs have audit features so you can tell a signing key hasn't been used for unexpected signatures, for example.
                            3. Copying to another similar device is not the only possible backup mechanism, check the documentation of your HSM.

                            rzeta0@mathstodon.xyzR This user is from outside of this forum
                            rzeta0@mathstodon.xyzR This user is from outside of this forum
                            rzeta0@mathstodon.xyz
                            wrote last edited by
                            #14

                            @armb @SAI_Peregrinus @poleguy @filippo

                            So getting keys into a HSM and configuring it must be done carefully a sanitised controlled environment.

                            I am starting to see how a HSM might fit into wider enterprise architecture now.

                            1 Reply Last reply
                            0
                            • R relay@relay.infosec.exchange shared this topic
                            Reply
                            • Reply as topic
                            Log in to reply
                            • Oldest to Newest
                            • Newest to Oldest
                            • Most Votes


                            • Login

                            • Login or register to search.
                            • First post
                              Last post
                            0
                            • Categories
                            • Recent
                            • Tags
                            • Popular
                            • World
                            • Users
                            • Groups