Terbawa tautan yang disodorkan Putu Arya Sabda Wijaya tentang - TopicsExpress



          

Terbawa tautan yang disodorkan Putu Arya Sabda Wijaya tentang keamanan sistem, saya sampai pada halaman Kebijakan Kunci PGP milik Daniel Fox Franke, staf di Akamai. Penjelasan yang disampaikan perihal kunci keamanan digital layak diteladani, saya salinkan bagian utama di sini dari https://dfranke.us/pgp-key-policy.html * * * Key security policy My pri­mary key (i.e., my cer­ti­fy­ing key which signs uids and sub­keys) is an of­fline key, stored only on a thumb-drive kept in a safe. The passphrase on the key con­sists of 20 ran­dom char­ac­ters cho­sen from among the 96 print­able ASCII char­ac­ters, and uses an s2k-count of 65011712 (the largest value sup­ported by GnuPG). When I need to use this key, I boot a Tails live sys­tem on a lap­top with no net­work con­nec­tion, copy­ing the needed pub­lic keys to and from an­other sys­tem via a USB thumb-drive. The pri­mary key does not ex­pire. I will re­voke it if I have a spe­cific rea­son to be­lieve that it has been com­pro­mised. My en­cryp­tion sub­keys are stored only along­side the pri­mary key and on a lap­top which, al­though it does have ac­cess to the in­ter­net, runs an ex­tra­or­di­nar­ily-hard­ened sys­tem and is used for very lim­ited pur­poses, thus min­i­miz­ing the like­li­hood of com­pro­mise. My en­cryp­tion sub­keys nat­u­rally ex­pire after one year, but I will re­voke them any time I learn of a sit­u­a­tion which could have led to their com­pro­mise – e.g., learn­ing of a re­motely-ex­ploitable vul­ner­a­bil­ity on my sys­tem – even if there is no in­di­ca­tion that such a com­pro­mise ac­tu­ally oc­curred. Given the lengths I have gone to min­i­mize my sys­tem’s sur­face for ex­ploita­tion, I hope this will be a rel­a­tively rare event. My (data-)sign­ing sub­keys may be stored on any sys­tem to which I am the only one with le­git­i­mate root ac­cess. This in­cludes sys­tems in my work­place cu­bi­cle; such sys­tems uti­lize full-disk en­cryp­tion and screen­saver locks, but they are vul­ner­a­ble to hard­ware key­log­gers and cold-boot at­tacks per­pe­trated by cowork­ers and any­one else who is able to get into my of­fice build­ing. My sign­ing sub­keys nat­u­rally ex­pire after one year. I will re­voke them any time I learn of a sit­u­a­tion which could have led to re­mote com­pro­mise, even if there is no in­di­ca­tion that such a com­pro­mise ac­tu­ally oc­curred; or if I have spe­cific rea­son to be­lieve that a phys­i­cal com­pro­mise oc­curred. Since my sign­ing sub­keys are stored on some sys­tems that em­ploy only or­di­nary lev­els of cau­tion to pre­vent re­mote ex­ploita­tion, they may be re­voked rather often as new vul­ner­a­bil­i­ties are dis­cov­ered.
Posted on: Sun, 28 Sep 2014 00:02:30 +0000

Trending Topics



Recently Viewed Topics




© 2015