Skip to content

Key material exported unencrypted [SYS-616] #14

@andre-kunz

Description

@andre-kunz

If private key files are stored without password protection on the file system, attackers with access to the system may be able to exfiltrate or use the private keys. For instance, attackers gaining physical access to the hard drive without disk encryption could likely read the file contents directly. Key material may also be accessible after the files have been deleted by performing file carving, should the file contents have not been overwritten in the meantime. It should also be noted that this approach of generating cryptographic key material tempts users to do it on (local) machines which don't have the recommended level of security nor auditability.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    Status

    in backlog

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions