[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: How can you protect a remailer's keys?



-----BEGIN PGP SIGNED MESSAGE-----

> From: [email protected] (Lance Cottrell)
> Date: Tue, 4 Jun 1996 22:02:11 -0700
> 
> The best solution I could come up with (and was willing to write and use)
> is to specify the passphrase on the command line argument to the compiler
> 
> make solaris -DPASS="foozooblue"
> 
>                 -Lance

A far better solution would be to have a long-running daemon hold the
secret key.  The mixmaster client could talk to the key daemon through
a unix-domain socket with the permission bits set such that only the
mixmaster user can connect.  Each time the machine is rebooted, the
operator must start the daemon and give it a passphrase.

This has two advantages.  First, it's a lot harder to back up the key
by accident.  If the key ever starts making it only your daily
backups, you are completely hosed because erasing a bunch of mag tapes
would take a lot of time--and maybe you also want to keep your
backups.

Second, if your machine is seized or someone gains unauthorized
physical access to it, the easiest way to get a root shell is by
rebooting single-user.  However, if the only cleartext copy of a key
is in memory rather than in the filesystem, once the machine is
rebooted the secret key is lost.

- - [email protected]

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Processed by Mailcrypt 3.4, an Emacs/PGP interface

iQCVAwUBMbWrj0TBtHVi58fRAQEkdQP/e7mouEmphgDmn0NKbaCM4lYnT2WbCFsk
irM2GjttiBdpQxr2QDJKBgmHnuGc09xdiexnGnn4bDFie70YDH2Zma3xF/0OvZeQ
DcgAz/0XwkAGPeLCSg8gfeykWwC0HUJlvGtmOwTQKFn5XtlqFM7pKIYF7lnFtoGY
AX/GoGauum4=
=rhyW
-----END PGP SIGNATURE-----