Security Basics mailing list archives
RE: key storage
From: Ajay <abra9823 () mail usyd edu au>
Date: Fri, 27 Aug 2004 11:08:47 +1000
i am using SunOS the problem is i dont have access to the webserver. my web applications consists of a number of python scripts that allow you to create define iser models. Thus there is no application start or end and all state (including keys used) must be stored in files which are read when a request is made. if i could actually configure the server (or if i had written my own server app) i could make it read a set of keys (or a passphrase) from a file (stored on removable media) at startup and use those. the media itself could be removed. But i cant really do that with a whole lot of cgi scripts, can i? since the webserver is an apache, i think i should look at what features it offers in such a situation - i was hoping someone would have come across this problem before and solved it cheers -- Ajay Brar, CS Honours 2004 Smart Internet Technology Research Group Quoting Andrew Tucker <atucker () windows microsoft com>:
What platform are you using? On Windows this is the exact problem that DPAPI was developed to solve. Another generic solution is to protect them with a key derived from a password that the user enters so you never actually have to store the key. -----Original Message----- From: Ajay [mailto:abra9823 () mail usyd edu au] Sent: Wednesday, August 25, 2004 4:01 AM To: security-basics () securityfocus com Subject: key storage hi! i am building a web application. for client authentication, i am using cookies which include the HMAC of the data. the server also has a public/private key pair for signing and verifying information. my question is how should these be stored on the server? encryption is the best solution, but if i encrypt them with another key, the question is where does this key get stored? thanks cheers ajay ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. ------------------------------------------------------------------------ --- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ------------------------------------------------------------------------ ----
---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. --------------------------------------------------------------------------- Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the source of computer crime and abuse so that it never happens again. http://www.infosecinstitute.com/courses/computer_forensics_training.html ----------------------------------------------------------------------------
Current thread:
- key storage Ajay (Aug 25)
- <Possible follow-ups>
- RE: key storage Andrew Tucker (Aug 30)
- RE: key storage Ajay (Aug 30)