> If you are only trying to protect the private key from being 
> extracted, 
> then the answer is obvious - don't use a software token, use 
> an HSM that 
> stores the key in such a way that it cannot be extracted.

And when Julien says HSM, a USB crypto token would provide security
vastly superior to a password protected PKCS#8/12.  He probably means
hardware token in general, which is good advice.

> If you are trying to protect the private key from also being used 
> improperly at any time, then I am not sure what the solution is for 
> servers that need to run and start unattended.

Some HSMs have provisions for even this sort of thing.  You create
quorums of cards with an n of k scheme where you need at least n out of
k cards to enable the use of a particular key which implies multiple
people are to be involved in the key activation.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to