Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. This post did not contain any content.

This post did not contain any content.

Scheduled Pinned Locked Moved Uncategorized
14 Posts 11 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • filippo@abyssdomain.expertF filippo@abyssdomain.expert
    This post did not contain any content.
    erlenmayr@chaos.socialE This user is from outside of this forum
    erlenmayr@chaos.socialE This user is from outside of this forum
    erlenmayr@chaos.social
    wrote last edited by
    #4

    @filippo Worst absurdity are network-attached HSMs.

    tab2space@mastodon.socialT 1 Reply Last reply
    0
    • R relay@relay.mycrowd.ca shared this topic
    • filippo@abyssdomain.expertF filippo@abyssdomain.expert
      This post did not contain any content.
      rzeta0@mathstodon.xyzR This user is from outside of this forum
      rzeta0@mathstodon.xyzR This user is from outside of this forum
      rzeta0@mathstodon.xyz
      wrote last edited by
      #5

      @filippo

      sorry to be so ignorant but what is a HSM?

      is it a machine dedicated to doing cryptography?

      armb@infosec.exchangeA alilly@solarpunk.moeA 2 Replies Last reply
      0
      • filippo@abyssdomain.expertF filippo@abyssdomain.expert
        This post did not contain any content.
        D This user is from outside of this forum
        D This user is from outside of this forum
        divergentdave@infosec.exchange
        wrote last edited by
        #6

        @filippo trusted hardware, the refuge of insoluble problems https://chaos.social/@gsuberland/112341253188262230

        1 Reply Last reply
        0
        • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

          @filippo

          sorry to be so ignorant but what is a HSM?

          is it a machine dedicated to doing cryptography?

          armb@infosec.exchangeA This user is from outside of this forum
          armb@infosec.exchangeA This user is from outside of this forum
          armb@infosec.exchange
          wrote last edited by
          #7

          @rzeta0 @filippo
          Hardware Security Module.
          Box that does cryptography and keeps keys inside a box. If anyone in the world can use it for cryptography, it doesn't really make the keys more secure. If you need a key to prove you're a person allowed to use the box, you have to keep that key safe outside the box.
          And if you ask the box to sign things you didn't understand, none of it helps.
          https://en.wikipedia.org/wiki/Hardware_security_module

          poleguy@mastodon.socialP 1 Reply Last reply
          0
          • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

            @filippo

            sorry to be so ignorant but what is a HSM?

            is it a machine dedicated to doing cryptography?

            alilly@solarpunk.moeA This user is from outside of this forum
            alilly@solarpunk.moeA This user is from outside of this forum
            alilly@solarpunk.moe
            wrote last edited by
            #8

            @rzeta0 @filippo A Hardware Security Module is a device that holds cryptographic keys and performs operations using them. Sort of like a super-smartcard?

            1 Reply Last reply
            0
            • R relay@relay.an.exchange shared this topic
            • erlenmayr@chaos.socialE erlenmayr@chaos.social

              @filippo Worst absurdity are network-attached HSMs.

              tab2space@mastodon.socialT This user is from outside of this forum
              tab2space@mastodon.socialT This user is from outside of this forum
              tab2space@mastodon.social
              wrote last edited by
              #9

              @erlenmayr @filippo

              Network-attached HSMs protect adequately against theft of hardware that involves cutting power to the host, so long as the multiple parties required for unlocking the HSM at startup can't be coerced into doing so with an XKCD 538 attack on themselves or loved ones.

              😏

              1 Reply Last reply
              0
              • armb@infosec.exchangeA armb@infosec.exchange

                @rzeta0 @filippo
                Hardware Security Module.
                Box that does cryptography and keeps keys inside a box. If anyone in the world can use it for cryptography, it doesn't really make the keys more secure. If you need a key to prove you're a person allowed to use the box, you have to keep that key safe outside the box.
                And if you ask the box to sign things you didn't understand, none of it helps.
                https://en.wikipedia.org/wiki/Hardware_security_module

                poleguy@mastodon.socialP This user is from outside of this forum
                poleguy@mastodon.socialP This user is from outside of this forum
                poleguy@mastodon.social
                wrote last edited by
                #10

                @armb @rzeta0 @filippo So it's like a supercomputer: turns processor bound problems into io bound problems?

                Except a networked HSM: turns a key security problem into multiple key security problems plus key exchange problems?

                sai_peregrinus@defcon.socialS 1 Reply Last reply
                0
                • poleguy@mastodon.socialP poleguy@mastodon.social

                  @armb @rzeta0 @filippo So it's like a supercomputer: turns processor bound problems into io bound problems?

                  Except a networked HSM: turns a key security problem into multiple key security problems plus key exchange problems?

                  sai_peregrinus@defcon.socialS This user is from outside of this forum
                  sai_peregrinus@defcon.socialS This user is from outside of this forum
                  sai_peregrinus@defcon.social
                  wrote last edited by
                  #11

                  @poleguy @armb @rzeta0 @filippo It also adds some financial problems. HSMs aren't cheap. And you need ways to back up the keys securely, which means onto another HSM. Amazon's "CloudHSM" is $1.45/hour, and has the obvious security issue of being a fucking cloud service, if you want opex issues instead of just capex.

                  rzeta0@mathstodon.xyzR 1 Reply Last reply
                  0
                  • sai_peregrinus@defcon.socialS sai_peregrinus@defcon.social

                    @poleguy @armb @rzeta0 @filippo It also adds some financial problems. HSMs aren't cheap. And you need ways to back up the keys securely, which means onto another HSM. Amazon's "CloudHSM" is $1.45/hour, and has the obvious security issue of being a fucking cloud service, if you want opex issues instead of just capex.

                    rzeta0@mathstodon.xyzR This user is from outside of this forum
                    rzeta0@mathstodon.xyzR This user is from outside of this forum
                    rzeta0@mathstodon.xyz
                    wrote last edited by
                    #12

                    @SAI_Peregrinus @poleguy @armb @filippo

                    So after reading the replies I am concluding that:

                    1. A HSM can accelerate cryptography by doing it in hardware. I understand this is less of a unique selling point as modern computer hardware can do it in hardware too?

                    2. A HSM is a specialised environment unlike a general operating system, which reduces the attack surface to stored keys, and may have anti-attack measures to defend against attempts at compromise. A general "all-purpose" OS and hardware can't for example delete keys if it detects an attempt to read the data bus.

                    2a. But a compromised general purpose OS can still read message before encryption and after decryption because that general OS still has to process that data ?! So the security benefit is limited?

                    3. A HSM doesn't help the problem of getting keys into the device, nor the backup problem in general (non-general a vendor may have mechanism to back it up to another one of their own devices).

                    Is that a fair summary?

                    armb@infosec.exchangeA 1 Reply Last reply
                    0
                    • rzeta0@mathstodon.xyzR rzeta0@mathstodon.xyz

                      @SAI_Peregrinus @poleguy @armb @filippo

                      So after reading the replies I am concluding that:

                      1. A HSM can accelerate cryptography by doing it in hardware. I understand this is less of a unique selling point as modern computer hardware can do it in hardware too?

                      2. A HSM is a specialised environment unlike a general operating system, which reduces the attack surface to stored keys, and may have anti-attack measures to defend against attempts at compromise. A general "all-purpose" OS and hardware can't for example delete keys if it detects an attempt to read the data bus.

                      2a. But a compromised general purpose OS can still read message before encryption and after decryption because that general OS still has to process that data ?! So the security benefit is limited?

                      3. A HSM doesn't help the problem of getting keys into the device, nor the backup problem in general (non-general a vendor may have mechanism to back it up to another one of their own devices).

                      Is that a fair summary?

                      armb@infosec.exchangeA This user is from outside of this forum
                      armb@infosec.exchangeA This user is from outside of this forum
                      armb@infosec.exchange
                      wrote last edited by
                      #13

                      @rzeta0 @SAI_Peregrinus @poleguy @filippo
                      1. Some HSMs provide acceleration, but the main point is the security.
                      2. Yes
                      2a. The compromised OS with an HSM client can read and leak messages, but it can't leak the key (assuming the HSM has suitable permissions on the key).
                      Some HSMs have audit features so you can tell a signing key hasn't been used for unexpected signatures, for example.
                      3. Copying to another similar device is not the only possible backup mechanism, check the documentation of your HSM.

                      rzeta0@mathstodon.xyzR 1 Reply Last reply
                      0
                      • armb@infosec.exchangeA armb@infosec.exchange

                        @rzeta0 @SAI_Peregrinus @poleguy @filippo
                        1. Some HSMs provide acceleration, but the main point is the security.
                        2. Yes
                        2a. The compromised OS with an HSM client can read and leak messages, but it can't leak the key (assuming the HSM has suitable permissions on the key).
                        Some HSMs have audit features so you can tell a signing key hasn't been used for unexpected signatures, for example.
                        3. Copying to another similar device is not the only possible backup mechanism, check the documentation of your HSM.

                        rzeta0@mathstodon.xyzR This user is from outside of this forum
                        rzeta0@mathstodon.xyzR This user is from outside of this forum
                        rzeta0@mathstodon.xyz
                        wrote last edited by
                        #14

                        @armb @SAI_Peregrinus @poleguy @filippo

                        So getting keys into a HSM and configuring it must be done carefully a sanitised controlled environment.

                        I am starting to see how a HSM might fit into wider enterprise architecture now.

                        1 Reply Last reply
                        0
                        • R relay@relay.infosec.exchange shared this topic
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups