Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security Government IT News

German Health Insurance Card CA Loses Secret Key 174

Christiane writes "The SSL Root CA responsible for issuing the German digital health insurance card lost its secret private key during a test enrollment. After their Hardware Security Module (HSM) dutifully deleted its crypto keys during a power outage, it was all 'Oops, why is there no backup?' All issued cards must be replaced: 'Gematik spokesman Daniel Poeschkens poured scorn on the statement that Gematik had insisted on the service provider carrying out a test without backing up the root CA private keys. "We did not decide against a back-up service. The fact of the matter is that the service provider took over the running of the test system, so it also has to warrant its continuous operation. How it fulfills this obligation is its own responsibility."'"
This discussion has been archived. No new comments can be posted.

German Health Insurance Card CA Loses Secret Key

Comments Filter:
  • by Opportunist ( 166417 ) on Tuesday July 14, 2009 @10:23AM (#28691533)

    Not even a month ago you chided them because there were too many copies (some of them even offsite, they just didn't know who had them now), now you chew them out for having too few. Make up your effing mind!

    • by MindKata ( 957167 ) on Tuesday July 14, 2009 @10:41AM (#28691819) Journal
      "too many copies" ... "having too few"

      This kind of organisation usually has a backup somewhere, they just have to find it. Its usually backed up on a post-it note somewhere. Maybe they should ask all of us to look for it, on the sides of our monitors.
      • by Vu1turEMaN ( 1270774 ) on Tuesday July 14, 2009 @11:09AM (#28692197)

        My Day 1:

        I actually found the administrator password on a post-it note on the back of the server's CRT monitor while cleaning the server room.

        "Fucking amazing" I said out loud, and as I pulled it off, on the back was the AmEx credit card number, expiration date, and 3digit pin for our organization to order IT stuff.

        Then I noticed on the left underside of the CRT there was another post-it that said Ctrl Shift Alt Num+....so I pressed that and up came a hidden menu of hidden apps running (SysTrayX + a sketchy prog to hide services in TaskManager), 90% of them illegal. Also uTorrent was running, seeding about 50 anime series buried deep within the network and using about half of the T3 connection's throughput.

        And to top it all off, I deduced that the server had never had a fresh install of Windows. It used to have NT Server, then they used software to upgrade it to 2000 Server, and software again to upgrade it to Server 2003. ......

        Day 7:

        I get a call from the old IT guy asking me whats wrong with the connection, and I told him I reinstalled Server 2003, deleted his anime cache, changed the WPA-PSK keys from 1111111111 to something way more secure, reported the AmEx card as stolen to get a new one, changed the admin password and set password age limits on all accounts, and replaced the rootkit infected SCSI drives with new ones that would last longer. Also, I told the managers that his 5000$ quote for network-wide unlimited antivirus was utter bullshit and that he only got a cracked key for Norton 2003 and installed it only on the server, and prolly pocketed the money.

        Damn dude was like "BUT I DIDNT BACK UP THE ANIME TO DVD YET!!!". Now I love anime as much as the next person, but I think he has other stuff to worry about at this point.

        But you know what got me the most mad and prompted all of this? The server was named Odie, and the computers were all garfield characters.

        CALVIN AND HOBBES FTW!!!!

        • by Vu1turEMaN ( 1270774 ) on Tuesday July 14, 2009 @11:11AM (#28692217)

          Oh, and his DAT72 backups had been failing for the last 2 years and he had never checked the logs.

          Good thing he left to start his own business! /shudder

        • Re: (Score:3, Funny)

          by Hurricane78 ( 562437 )

          Day 8:
          You got fired, and the system got "restored" because your "fixes" halted the whole "business".
          It was a sad day.

          • by Vu1turEMaN ( 1270774 ) on Tuesday July 14, 2009 @12:51PM (#28693729)

            Heh...I'm actually just doing a paid internship at a non-profit after their full-time guy left. It was supposed to end on May 1st, but hey I guess they love what I've done.

            Got them a cheap dedicated backup system, updated all the systems and reinstalled an NLite-ed XP on every computer, and moved them from Exchange to Google. Oh, and the lab computers run Ubuntu.

            They also loved it when I found the IT guy's secret paypal business account with 3000$ sitting in it that was supposed to be used for something else (battery backup replacement batteries). Putting passwords in a file on the administrator's desktop called "passwords for everything.txt" is sooooo helpful for when you're trying to be sneaky.

            Seriously, this shit is a soap opera of IT-isms.

            • by Artifex ( 18308 )

              Are you making this up? If not, your company should take criminal action against the prior employee.

              • Done months ago. And no, I don't make shit up. They settled (out of pity) for the money they found that he took after going through their books, but he's pretty much blacklisted in the city we're located in so he moved.

                The whole branch nonprofit is over to free software (minus xp/2003 on the dell computers they have and office 2003/outlook 2007 VLKs bought from techsoup).

                The last thing they need to do is switch to voip and get rid of the horrible lease they're on for their ancient PBX that this idiot convin

                • He probably only convinced them to get the PBX so he could run conference calls and sell them to people on the outside for a profit.
                • Let be guess, a Lucent Partner "so-easy-an-idiot-can-setup" phone system?;)

                  I don't have anything agenst Partners, you were locked in harder than Microsoft with those systems.
          • ...Then the business got pwned six times the following month and abruptly went Chapter 7.

        • by Ihmhi ( 1206036 )

          Since you don't have your e-mail listed, I'm posting here.

          I'm a highly underpaid IT admin working at a 501(c)(3) trying to admin a woefully underequipped, underpowered, and understaffed network. I'm having a hard time figuring everything out. If I could toss a few questions your way and you'd have the time to answer them, would you please e-mail me?

          ihmhi6@gmail.com

      • If everything fails, keep browsing through various pages trading in that stuff, you'll eventually find it...

      • Re: (Score:3, Insightful)

        by v1 ( 525388 )

        Its usually backed up on a post-it note somewhere.

        For a root CA private key, better be a big post-it note

        (or written in really small letters)

        • by Yaa 101 ( 664725 )

          Common keysize is 2048 bits which makes 256 8-bit words or characters.

          • by v1 ( 525388 )

            that's 512 0-9A-F (or 65536 0-1 I suppose) to write down. And I thought trying to enter a WEP key in windows was bad...

  • by freedom_india ( 780002 ) on Tuesday July 14, 2009 @10:24AM (#28691551) Homepage Journal

    Once again, misleading title to a different summary.
    For fuck's sake, the Germans didn't lose the key.
    The SSL Root CA lost that.
    Get the facts right.
    For a second i was wondering how Germans could that stupid. That is unlike the Germany i know. And exactly as i suspected, the German insurer had been insisting the root CA for backup while the CA thought it was unnecessary.
    Is it the German company's fault?

     

    • by Opportunist ( 166417 ) on Tuesday July 14, 2009 @10:28AM (#28691605)

      After all, we all know Germans are exact and punctual, Poles are thieves, Russians are drunk and Fins are even more so. Oh, and Mexicans are lazy and US people are simple minded. Any stereotype missing?

      • by MancunianMaskMan ( 701642 ) on Tuesday July 14, 2009 @10:31AM (#28691651)

        Any stereotype missing?

        yes.

        we British are all of the above.

        • by Opportunist ( 166417 ) on Tuesday July 14, 2009 @10:36AM (#28691717)

          Not only that, they have really weird tastes, too. In food and bed. Sometimes at the same time.

        • And how exactly do you pull off being exact and punctual while being sloppy and unable to figure out what time it is from being drunk?

          • And how exactly do you pull off being exact and punctual while being sloppy and unable to figure out what time it is from being drunk?

            Practice... lots and lots of practices. Speaking of which it's time for me to do some practicing.

            • by johnw ( 3725 )

              Speaking of which it's time for me to do some practicing.

              That should be "practising" - oh, and we're good at pedantry too.

          • how exactly do you pull off being exact and punctual...

            They tattoo the pub opening time and location on their arms.

          • by hey! ( 33014 )

            Well "exact" could mean "accurate" or it could mean "precise".

            I take it to mean it to mean that Brits in their inebriated state have a gift for putting their fingers and other assorted appendages in precisely the wrong place.

        • we British are all of the above.

          So, you're punctual, thieving, drunk, lazy, simple minded, and British.

          So, just like the Irish then, you mean?

          • So, you're punctual, thieving, drunk, lazy, simple minded, and British.
            So, just like the Irish then, you mean?

            The Irish don't like being called "punctual", you insensitive clod!
            (And they really hate being called "British")

        • Any stereotype missing?

          yes.

          we British are all of the above.

          What about the Irish?

      • I must take issue with your sweeping nationalistic statement. Poles aren't theives - that's Romanians. Poles are honest. Crap at plumbing, but honest.

        • The "crap at plumbing" is due to a little known fact. Namely that Poland invested zero into the infrastructure in the western areas they got after WW2, fearing they'll eventually return it to Germany. Until not too long you could find pipes dating back to pre-1940.

      • .... and US people are simple minded. Any stereotype missing?

        Simple minded? I thought we were just fat and lazy.

        • You're fat and lazy because you're simple minded. And if you weren't so simple minded, you'd be able to figure that out.

          Me, I'm Canadian with British parents. So apparently I'm exact and punctual while stealing booze, but I apologize politely to the shopkeeper for swiping it.....

      • Re: (Score:3, Insightful)

        by Bemopolis ( 698691 )

        After all, we all know Germans are exact and punctual

        Well, we DO know that they are awfully good at writing numbers down. Sometimes even up the arm.

      • Not all stereotypes are without foundation: I can confirm from personal experience that Germans tend to be punctual and expect the same of others, Finns tend to be hard drinkers and tough as old boots and, for what it's worth, never go drinking with Icelanders.
      • "After all, we all know Germans are exact and punctual, Poles are thieves, Russians are drunk and Fins are even more so. Oh, and Mexicans are lazy and US people are simple minded. Any stereotype missing?"

        That all Oriental people are great drivers, and the men are well endowed?

    • Re: (Score:3, Insightful)

      by Sockatume ( 732728 )

      The summary even states that Gematik insisted on a back-up less operation, and then provides a quote explicitly stating that they did no such thing! Slashdot: doing for editorial accuracy what Fox does for editorial neutrality.

      • Re: (Score:3, Informative)

        by multisync ( 218450 )

        The summary even states that Gematik insisted on a back-up less operation, and then provides a quote explicitly stating that they did no such thing!

        Gematik commissioned D-Trust to provide the root CA as a service. D-Trust managing director Matthias Merx stated "Gematik decided to 'do without a back-up'. As a service provider, we have to accept that."

        From the article and summary:

        "Gematik spokesman Daniel Poeschkens poured scorn on the statement that Gematik had insisted on the service provider carrying out

        • I'm guessing that our self-evidently poor (well, my self-evidently poor) reading ability is to blame somewhere.

        • by WarlockD ( 623872 ) on Tuesday July 14, 2009 @02:46PM (#28695133)
          I don't know..

          "We did not decide against a back-up service ..."

          That double negative sounds awful like "At the time, we didn't know what they were asking":P I guess its just with personal experence. Evey time I hear a manager use double negatives to defend a decision, its because they didn't really know what they were deciding in the first place. Atleast in IT.

    • Re: (Score:3, Informative)

      by Bigjeff5 ( 1143585 )

      The title/summary are not necessarilly incorrect, just ambiguous. English can do that, and if you aren't paying attention your meaning can be taken in a way other than you intended.

      In this case, there are a few ways to read "German Health Insurance Card CA":

      1.) The Health Insurance Card CA of German origin
      2.) The CA for the German Health Insurance Card
      3.) The Card CA for German Health Insurance
      4.) The Insurance Card CA for German Health

      Obviously they aren't saying 3 or 4, those work gramatically but don't

    • by JaredOfEuropa ( 526365 ) on Tuesday July 14, 2009 @12:24PM (#28693305) Journal
      Even so, this line struck me as all too familiar: "The fact of the matter is that the service provider took over the running of the test system, so it also has to warrant its continuous operation. How it fulfills this obligation is its own responsibility."

      This is why managers (especially the MBA types) love outsourcing of everything. It is also in part because numbers and KPIs are so much more easy to manage than actual people. But mainly, by outsourcing a function you also get to outsource the responsibility for that particular function. If things go tits up, the worst you'll be blamed for is picking the wrong service provider, or perhaps not monitoring a particular KPI properly. Minor stuff.

      I've seen plenty of managers like that, and I have heard a variation of that one line all too often.
      • by cheros ( 223479 )

        Hah. Why do you think the consultants were thick as flies in government during New Labour's reign?

        Yup, the Shaggie defence (it wasn't me)..

    • Some Germans are rather sensitive, aren't they? They'd better not talk to VW owners in the US.
  • NSA/CIA (Score:4, Funny)

    by Anonymous Coward on Tuesday July 14, 2009 @10:26AM (#28691591)

    Maybe they should check with the NSA or CIA? They've got a backdoor into EVERY system, and may still have the key saved on a laptop lying around somewhere.

  • Could be worse (Score:5, Insightful)

    by bradgoodman ( 964302 ) on Tuesday July 14, 2009 @10:28AM (#28691609) Homepage
    I'd rather the key be lost, than stolen, hacked, made-public, etc. At least it didn't breach security in the typical manner.
    • Re:Could be worse (Score:4, Interesting)

      by Opportunist ( 166417 ) on Tuesday July 14, 2009 @10:34AM (#28691691)

      What's worst about it is that this is probably presumed to be worse. Had the key be stolen, they'd probably not even report it because business could continue as usual, maybe nobody finds out...

    • by Animats ( 122034 )

      Mod parent up. In the serious crypto world, this is a good thing, provided it doesn't happen too often. Sometimes you're going to lose a key, because, for security reasons, you don't keep extra copies. You have a procedure for issuing new keys when this happens, which you're routinely doing anyway.

    • Re: (Score:2, Interesting)

      by Anonymous Coward

      It could be worse, but this incident exposes a design flaw: The loss of a private key should not stop them from issuing new cards which are compatible with the existing cards.

      If a CA key is lost, then there should be a layer above it which can create a new CA key. Cards are checked against the top CA public key, so the old and the new cards can both be verified. Because the top CA is only used to create intermediate CAs, its private key can be kept safer than the key of a CA which is regularly used for sign

  • by Curmudgeonlyoldbloke ( 850482 ) on Tuesday July 14, 2009 @10:32AM (#28691669)

    It would easily be found be searching the nearest pub car park for USB keys, or checking the train that the relevant civil servant travelled home on.

  • The entire concept of PKI revolves around the inheritance of trust from the root CA. It seems pretty clear these guys can not be trusted. I would be worried about the people who have to use them.
    • Re: (Score:2, Insightful)

      That's just silly. They obviously take security seriously enough that they found re-issuing all of their certs preferable to adding a second storage place for the private key, thus doubling the possibility of the system being compromised.

      If the key had been compromised, that would be a breach of trust. This is more an example of the fact that as security increases, usability decreases.

      • No, that is just silly. Of course there should be a backup kept in a physically secure location for events just like this. In a real environment when a root CA loses its private key they not only have to reissue all new keys to everyone, but to all the CAs below them and all the users and CAs they signed (and so on all the way down the chain). This cascades quickly into a huge mess that can easily cost millions upon millions to clean up.
        • Why do they have to issue new keys? I'd think that as long as their public key is still known, that all the issued signed keys would still be valid. They'd just have to use a new key pair for any new signed documents.

          • by Sloppy ( 14984 )

            Damn good question. Losing a signing key doesn't mean the signatures can't still be checked.

          • Re: (Score:3, Insightful)

            by Sloppy ( 14984 )

            Actually, I can think of a reason, after all. Since this CA no longer has the ability to revoke prior signatures made with that key, then that key can no longer be trusted as a signer. You can check to see if a CA has certified something, but there's no way to check to see if the CA changed their mind, because the CA no longer has a way to say that.

          • All the issued signed keys are still valid. That's the problem.

            There's no way to now invalidate a signed key that was issued with this CA.
            Normally you can revoke a certificate, so it's no longer accepted. OpenVPN, for example, allows this, because you can set it to check a Certificate Revocation List. Any employee gets fired, certificate gets compromised, or whatever, and you add it to the CRL, and that client can no longer connect.

            Right now, if they find that a health card was issued fraudulently, or fo

          • by cheros ( 223479 )

            Actually, people only give you half the story. Not only can existing keys not be revoked (serves you right for not setting a timeout), you can also not create new keys.

            The second part is where it gets entertaining. In order to cure that problem (which is something you want to sort if you're about to waste a lot of money on issuing certs) you will have to generate a NEW root certificate. However, there can only ever be one root, putting a new root key in the system means you have just broken the chain of

      • Well, as far as the security of the backup is concerned, isn't splitting the secret [digital-scurf.org] an option? Like having seven different keys to the national crown jewels' safe. :-)
        • Re: (Score:3, Insightful)

          by mlts ( 1038732 ) *

          PGP Desktop has this option. You can share a key and split it among people, where x amount of y pieces are needed to recover the original key, where both x and y are user selectable values.

          However, if a key is a top root CA key, you would not be using it on a general purpose computer. You would have the key generated in a HSM and stored there, where someone can perhaps use the key to sign and decrypt stuff, but would have to go to a lot of trouble to get past all the hardware tamper evident stuff in the H

  • by starfishsystems ( 834319 ) on Tuesday July 14, 2009 @10:35AM (#28691709) Homepage
    There are two fundamental ways to fail as a CA. There must be exactly one party in effective possession of the private key of the root cert. If the number of parties becomes less than or more than one, fail.

    Mistakes happen, of course, and certificate infrastructures can be enormously complex. But if you're going to do any kind of risk mitigation, the absolutely most basic place to start would be with these two scenarios.
    • by radtea ( 464814 )

      certificate infrastructures can be enormously complex.

      This is the problem: simplicity is the key to security. A complex system is just one with more places to hide exploits.

    • by hey! ( 33014 )

      So, it's kind of like the optimist/pessimist thing, right?

      As an optimist, I'd say that least they didn't fail in the worst possible way.

      The pessimist in me thinks I should get a bit more than "not failing in the worst possible way" when I pay somebody a barrel of cash to hash a couple numbers for me.

      • Re: (Score:3, Informative)

        by jvkjvk ( 102057 )

        As an optimist, I'd say that least they didn't fail in the worst possible way.

        The pessimist in me thinks I should get a bit more than "not failing in the worst possible way" when I pay somebody a barrel of cash to hash a couple numbers for me.

        No, that's also the optimist in you.

        Cheers. :)

    • How about backups on heavy steel punch-cards sealed and stored in some sort of vault? No serious risk of erasure, and much more difficult to walk off with than any sort of digital backups.
    • I wouldn't have thought keeping the root online at all times was particularly sensible. At least I seem to remember that this was some of the point of the hierarchical certificate system. You generate the root cert, then some tier 1 certs and turn off the root, put it in a cupboard* use the tier 1 certs to generate more, this way you don't compromise the absolute top of the hierarchy. Which should make the fail moments slightly easier to manage.

      *preferably one with a good lock and lined with steel.

      • You're on the right track, for sure. As we're talking about fundamentals and not implementation details, the key phrase again is "in effective possession". I can't add more to what I've already offered on that subject.

        I often speak in favor of operating a certificate hierarchy, as you've described. But notice that spreading the risk across multiple points of failure not only increases the intrinsic risk of failure, it multiplies the cost of managing the certificate infrastructure. A secondary risk is
  • by 192939495969798999 ( 58312 ) <info&devinmoore,com> on Tuesday July 14, 2009 @10:37AM (#28691729) Homepage Journal

    Q: How do you learn every German swear word in about 20 seconds?
    A: Tell the German admin that you lost the root key.

    • Re: (Score:3, Insightful)

      The best part is it will all be contained in a single, monstrously large word. Ah, german efficience.
  • I'm confused (Score:5, Insightful)

    by Candid88 ( 1292486 ) on Tuesday July 14, 2009 @10:40AM (#28691793)

    card lost its secret private key during a test enrollment

    I'm confused, isn't this sort of problem exactly why you carry out system tests?

    Sending out new cards to card testers during a systems test is hardly extraordinary.

    • I don't think that is the extraordinary part. The part we are focused on is the fact that they specifically refused any sort of backup before testing, knowing full well that all sorts of things can and do happen during testing. And these are the people who will be in charge of this system when it goes live.
      • Re:I'm confused (Score:4, Informative)

        by WarlockD ( 623872 ) on Tuesday July 14, 2009 @12:44PM (#28693629)
        See I read that part differently.

        Matthias Merx, the firm's managing director, told heise online that following a voltage drop, something happened in D-Trust's "Trustcenter" that does occasionally occur. "The HSM independently deleted the data because it suspected an attack."

        Translation? "Someone unplugged the backup power supply before setting the proper mode in the card because we didn't fully understand how sensitive the card is for root CA certs"

        Merx explained that "Gematik decided to 'do without a back-up'. As a service provider, we have to accept that,"

        Translation? "We asked Gematik that it might be a good idea to back it up and they said its fine its just for testing." or "We recommended to Gematik to back up the card before shipping it to us. They shipped it to us and we just shrugged our shoulders." Bonus points if you guessed they asked a low level manager at Gematik who thinks CA is the first two letters of a cat.

        Gematik spokesman Daniel Poeschkens poured scorn on the statement that Gematik had insisted on the service provider carrying out a test without backing up the root CA private keys. "We did not decide against a back-up service. The fact of the matter is that the service provider took over the running of the test system, so it also has to warrant its continuous operation. How it fulfils this obligation is its own responsibility."

        Traslation? "Gematik is taking NO RESPONSABLITY WHATSOEVER for doing any safty checks before giving our root ca to an outside vendor."

        All in all its not a big deal though. It looks like they just lost the issuing CA and not the revoke keys. It looks like they can still authenticate too. Now if this was the MAIN system germany with 80+ million plus medical cards? I think people are going to be shot:P

  • "the firm's managing director, told heise online that following a voltage drop, something happened in D-Trust's "Trustcenter" that does occasionally occur" You cannot even say what's worse: A voltage drop even reaching the HSM or the HSM going suicidal and loosing the key. And all of that "occasionally"? Everytime they make popcorn in the microwave? As a german I am quite flabbergasted by this lack of german engineering, in one of the countries largest trust-centers.
  • Place blame (Score:5, Funny)

    by ubrgeek ( 679399 ) on Tuesday July 14, 2009 @10:56AM (#28692007)
    Poeschkens claimed, "I know nothing! noth-thing!" and proceeded to blame the problem on a man he would only identify as "Hogan."
  • by T Murphy ( 1054674 ) on Tuesday July 14, 2009 @11:05AM (#28692133) Journal
    For those of you who are wondering what CA is, it stands for Certificate Authority. You see, the Germans have a hard time functioning without a constant stream of praise, so they have this authority in place that prints and sends certificates to people. Every day thousands of Germans get congratualted for crossing the street, for finding their car keys or for eating their 1000th potato of the month. You know you've walked into a German household when you see the wallpaper of framed certificates.

    The problem here is that the company deleted the certificate-printing program since they thought someone was trying to hack in and print more certificates for themselves- no one is THAT special so they had to stop him. They forgot to have another program ready to print more certificates, so now Germany is under threat of entering a depression since they no longer get certificates telling them how special they are.

    On a serious note: I don't follow this article very well with all the acronyms being spelled out but not explained, and no background knowledge of anything going on here. If someone would care to explain what is going on here to someone that has never heard the term CA, you should get a +5 informative easily.
    • Re:What is "CA"? (Score:5, Informative)

      by Ritorix ( 668826 ) on Tuesday July 14, 2009 @11:42AM (#28692669)

      I will simplify, but basically a CA (Certificate Authority, that much of the parent wasnt a joke) is a server that creates encryption certificates. In this case, SSL certificates. For example, when you goto https://mail.google.com/ [google.com] that SSL certificate was created by the Thawte SGC CA. Thawte is one of many companies that you can pay to create you an SSL cert, so your users can communicate with your server via https.

      The CA itself also has an encryption key, which is stored on hardware. In some cases its a PCIe board, others its a removable PCMCIA card, etc. This particular CA used an add-on board which lost power during operation, wiping out its only key. The board seems to have been working as intended, preventing attack (removal of board, which would cause power loss) by wiping itself.

      Without that key, the CA can no longer create revocation lists (CRLs, lists of certs a CA has created that have since been revoked or expired) or any new certs. They are dead in the water, also causing every cert they have ever made to become invalid as they can no longer be checked against a recent CRL. They have to start from scratch, recreating every_single_cert.

      This was only a test system, but if this happened in reality 80 million Germans would have invalid health cards. At least they discovered the value of a backup during testing.

      • by mcrbids ( 148650 )

        BTW: The private key doesn't have to be stored on a card, it can be just as easily set up as a file on a disk.

        I looked into becoming a CA once in order to support a state contract - we were just going to use OpenSSL and a strongly physically secured computer with no network access.

        • by dkf ( 304284 )

          I looked into becoming a CA once in order to support a state contract - we were just going to use OpenSSL and a strongly physically secured computer with no network access.

          You might use a two-layer system. Have a master CA and a production CA. The master CA is kept offline (and probably normally unpowered and in a locked fire-proof safe) and is only used to sign the production CA. The production CA issues all the certs that you're actually using to secure normal servers and users. (Actually, you can go with more than one layer of production CAs, but that's less important.) The idea is that the master only needs to be used extremely rarely, so it can be secured using extra str

      • Re: (Score:2, Informative)

        Disclaimer: I work for a company that specialises in these kind of deployments, however, they do not endorse anything I am about to say, and I am doing so as an individual. All the information in here is public knowledge.

        A few points first:
        - A CA doesn't only create encryption certificate. It can create a variety of certificates, including Windows Logon, Signing certificates, etc. It all depends on the Certificate Policies that are configured on the CA.

        - We have no information the CA was indeed issui
  • Best practices (Score:2, Informative)

    by Shulai ( 34423 )

    Best practices about CA management says you should have your secret key in a (physical) safe. Better yet, divide it in two pieces and put it along the passphrase in three different safes (part1+pass,part2+pass,part1+part2), so you can't lose key access even if you lose one safe, and nobody can take the key by opening a single safe.

    • by cheros ( 223479 )

      And where do you keep the keys for those safes? Or their access code?

      Just curious :-)

      • In a sufficiently large organization you should have enough areas.

        For example, in my organization we keep the combos for other safes in safes with the same sensativity level because, well, drilling is slow and expensive. In different buildings, by preference.

        Said combo comes with a list of who's allowed to pick it up, and is in a tamper evident container. Beyond that chain of command comes into play.

        Keeping parts of the code in different safes would be even more secure.

  • by meerling ( 1487879 ) on Tuesday July 14, 2009 @12:26PM (#28693355)
    In talking with people (or company representatives) about their security regarding passwords and keys, I always told them two things.

    First, all security experts will tell you that you should not keep copies of that stuff around.

    Second, that's not a realistic expectation, stuff happens. The IT guy goes on vacation, has an accident, or dies. (Seen all 3 numerous times.) You fire the Admin for some reason. This building burns down. Etc.

    A reasonable thing to do, is keep a password/key log with that critical information that is kept up to date at all times. You have two copies of it. Both are kept secure in good quality safes (not a $200 lockbox).
    Both safes are in different physical locations, at least separate buildings, preferably miles apart.
    The reason for this is pretty easy. Once again, things happen. I've seen buildings burnt down, flooded, inaccessible due to chemical hazards from a truck wreck, etc. You don't know what will happen, but if you have them stored at separate physical locations, you at least know you will be able to get to one of them if you need to, assuming nobody uses a nuke.

    It all falls under that old techie saying, "So, when did your data become important to you? Before or after you lost it...".
  • Spoonerism (Score:2, Funny)

    by Curate ( 783077 )
    Gematik spokesman Daniel Poeschkens poured scorn

    I literally read that as scoured porn...

  • by russotto ( 537200 ) on Tuesday July 14, 2009 @01:38PM (#28694375) Journal
    "We did not decide against a back-up service. The fact of the matter is that the service provider took over the running of the test system, so it also has to warrant its continuous operation. How it fulfills this obligation is its own responsibility."' If this were originally in English, it would mean "We knew this would happen and we tried to tell them, but those arrogant SOBs thought they knew it all and didn't want to listen to us. So we shut up, pulled up a chair, got some popcorn, and waited for the fireworks". I'm not sure that translates, though...
    • Notice how the Gematik spokesman never actually denies that they didn't want to pay for a backup. A better translation:

      "The service provider offered a backup service but we didn't want to pay for it. But they lost the key, so even though they warned us of this and we still said no, it's their responsibility."

The Shuttle is now going five times the sound of speed. -- Dan Rather, first landing of Columbia

Working...