Skip to content

Add option to require HSM pin on step-ca startup. #660

Open
@kism

Description

What would you like to be added

I'd like to have the option to not have the HSM pin stored in a configuration file, but instead be required to be entered manually by an operator each time the CA is started.

Why this is needed

Having HSM pins sitting on the file system weakens the security in cases of hardware being stolen.

In theory if the PIN is not known then stealing a server and HSM will be useless to an attacker.

In cases where step-ca is running as a service my idea is:

  1. step-ca program starts up but stalls, prompting for a pin
  2. The user enters the pin if they are running step-ca interactively, if they are running step-ca as a service there could be a command to send the pin to step-ca (see EJBCA's bin/ejbca.sh ca activateca)
  3. step-ca uses the pin to access the pin and continues as per normal
  4. HSM pin is not logged anywhere

Activity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions