[Libwebsockets] Private key in SSL
bruce at perens.com
Fri Jun 10 09:14:55 CEST 2016
On Thu, Jun 9, 2016 at 10:39 PM, Andy Green <andy at warmcat.com> wrote:
> The key and the passphrase do pass through lws + openssl, that would be
> enough if the attacker compromises the userland part and then forces the
> admin to restart it.
The key and passphrase remain within the token. So, we have to combine lws
and openssl with OpenSC, which controls the token and provides a public-key
engine to OpenSSL that causes the token to be used. We don't provide the
key to lws, we just provide the *name* of the key and it asks, through
openssl and OpenSC, for the token to use it.
Or if my app can get things manipulated by this 'tamper resistant
>> hardware', I can inject my request in the userland app, or by
>> duplicating what the app does on usb or whatever, and get things
>> signed by it as if I was the app.
Yes. It will use the key if an unauthorized person gets in a position to
ask it to. But it will never reveal the key. So, the compromise is limited.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Libwebsockets