[Opendnssec-user] Looking for a "cheap" HSM

Rickard Bellgrim rickard at opendnssec.org
Tue Aug 20 09:14:48 UTC 2013


>
> IIUC, user talks to web, web talks to WService, WService talks with token.
> Doesnt that break the rule of the "user being the only one having the
> PIN/access to key"
>

How the PIN is transferred over multiple systems to the HSM/token is out of
scope. You have to build/use a system which makes sure that the transaction
to the library is safe.

The other possibility is:
> user attack pk11lib, pk11lib opens a secure tunnel to HSM
> So the security is based on a local software key, which can be craked
> allowing someone to sniff around.
>

The main purpose of the PKCS#11 library is to deliver your commands over to
the HSM. Cracking the library won't give you any extra information. The
private key operations are performed on-board the HSM. If the library e.g.
acts as a HA-client for the HSM-cluster, then traffic between the HSM:s
are/should be encrypted. Thus not being able to know the contents of the
HA-traffic.

You could also have a look on the PKCS#11 Spy software from the OpenSC
project on how to tap the PKCS#11 traffic/commands.

If you want to attack an HSM, then you could e.g. try to exploit the API it
exposes to the PKCS#11 clients/libraries.

// Rickard
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opendnssec.org/pipermail/opendnssec-user/attachments/20130820/5d6c5d10/attachment.htm>


More information about the Opendnssec-user mailing list