<tt><font size=2>Ville Mattila wrote on 10/27/2009 05:08:37 PM:<br>
<br>
> Hi,<br>
> <br>
> Why should one bother setting up a hardware HSM for OpenDNSSEC signer<br>
> to protect zone/key signing keys?</font></tt>
<br>
<br><tt><font size=2>To be clear, OpenDNSSEC does not mandate a hardware
HSM. It is possible to run it with SoftHSM.</font></tt>
<br><tt><font size=2> <br>
> Consider attacker trying to forge a signed zone. He gains root
privileges<br>
> on OpenDNSSEC signer host and modifies the incoming yet-unsigned zone<br>
> data before the records are fed to HSM for signing. Thus root
access<br>
> (and the user processing incoming unsigned zone) on OpenDNSSEC signer<br>
> host must be secured very carefully regardless of whether one is using<br>
> hardware or software HSM. Right?</font></tt>
<br>
<br><tt><font size=2>Right!<br>
<br>
> Keys must, of course, be well protected and hardware HSM does that<br>
> better than software (because of far more restricted physical/software<br>
> access methods?). But what are the signing keys in general good
for<br>
> from attackers point of view? Use them for poisoning a resolvers
cache<br>
> with e.g. the well known Kaminsky method? </font></tt>
<br>
<br><tt><font size=2>Yes. </font></tt>
<br>
<br><tt><font size=2>> Anything else?<br>
</font></tt>
<br><tt><font size=2>Signing a zone also provides protection against man
in the middle attacks, i.e. scenarios with a compromised secondary server,
or with a compromised system somewhere on the path between the server and
the validator. This is an independent class of attacks from cache-poisoning.</font></tt>
<br>
<br><tt><font size=2>Additionally, signing a zone increases the usability
of that zone for securely distributing additional services. As an example,
folks already envision x509 certificates in the DNS, signed using DNSSEC.
</font></tt>
<br>
<br><tt><font size=2>An HSM can also be used as a signing accelerator,
when a software based keystore (for lack of a better term) is just not
fast enough.</font></tt>
<br>
<br><tt><font size=2>An HSM solves the problem of key-leakage, but not
key abuse. Anyone with remote (and root) access to a system that communicates
with an HSM is likely able to inject data.</font></tt>
<br>
<br><tt><font size=2>Kind regards,</font></tt>
<br>
<br><tt><font size=2>Roy Arends</font></tt>
<br><tt><font size=2>Sr. Researcher</font></tt>
<br><tt><font size=2>Nominet UK</font></tt>