(no title)
pzb | 9 years ago
Many HSMs also add advanced authentication capabilities, such as M-of-N access control and/or hardware authenticators (e.g. you need 3 of 5 smart cards to use the HSM). The other key feature usually found in HSMs but not smart cards is backup/cloning without exporting the key (in PKCS#11 terms). This means that the key can be moved between HSMs with all the protections in place. I've yet to see a smart card that does this.
amluto|9 years ago
How does this work? Can an attacker buy an identical HSM, back up the key, and restore it onto the new HSM?
nicolas314|9 years ago
j_s|9 years ago
https://news.ycombinator.com/item?id=12069784
The NitroKey HSM requires all previous setup (DKEK?) passwords and PINs. Anecdotal random unnamed vendor? Not so much:
They did, with undocumented commands, export the key from the device in an unencrypted format and loaded it into the other model
matthiasb|9 years ago
hlandau|9 years ago
And this is exactly my point, it's all functionality which the manufacturers have decided some customer might need. I don't want that, I want a secure general-purpose Turing-complete execution environment which gives me full flexibility in what crypto, mechanisms and policy to implement. This entire industry approach is silly.
pekk|9 years ago