Subrata,

Subrata Mazumdar wrote:
> 
> 
> Wan-Teh Chang wrote:
>> On Sat, Sep 27, 2008 at 12:17 PM, Nelson B Bolyard 
>> <[EMAIL PROTECTED]> wrote:
>>  
>>> Subrata Mazumdar wrote, On 2008-09-27 06:33:
>>>    
>>>> Actually, the problem is even worse - some of the applications use
>>>> unencrypted private key
>>>>       
>>> That is precisely why NSS does not support PKCS#8 files.  Applications
>>> that generate private keys and then just leave them lying around in
>>> unprotected files are having fun with cryptography, but aren't serious
>>> about security.  NSS is serious about security.
>>>     
>>
>> I am very interested in the secure solution to this problem: how to
>> manage a large number of servers easily.  It'd be cumbersome
>> to have to enter the password for the private key to each of the
>> servers.
>>
>> I suspect that some NSS-based servers read the password from
>> an unencrypted file.  Our selfserv test program has such an
>> option (-f password_file).  How does mod_nss solve this problem?
>>
>>
>> Wan-Teh
>>   
> I was wondering about this problem. I am also curious to find out what 
> is the best practice in
> storing password for servers for accessing protected  key stores.
> -- 
> Subrata
> 

If you are only trying to protect the private key from being extracted, 
then the answer is obvious - don't use a software token, use an HSM that 
stores the key in such a way that it cannot be extracted.

If you are trying to protect the private key from also being used 
improperly at any time, then I am not sure what the solution is for 
servers that need to run and start unattended.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to