[144679] in cryptography@c2.net mail archive
Re: Unattended reboots (was Re: The clouds are not random enough)
daemon@ATHENA.MIT.EDU (Richard Salz)
Mon Aug  3 16:59:23 2009
In-Reply-To: <4A7674B0.8020106@strongauth.com>
To: Arshad Noor <arshad.noor@strongauth.com>
Cc: Cryptography <cryptography@metzdowd.com>
From: Richard Salz <rsalz@us.ibm.com>
Date: Mon, 3 Aug 2009 11:24:22 -0400
> All the HSMs I've worked with start their system daemons automatically;
> but the applications using them must still authenticate themselves to
> the HSM before keys can be used.  How do the cards you've worked with
> authenticate the application if no PINs are involved?
Sorry, I wasn't clear enough.  When I think PIN I think of a keypad and 
secure channel to the HSM.  Not the name/password used by the application. 
 For that, of course, you're right -- the application needs it.
        /r$
--
STSM, DataPower CTO
WebSphere Appliance Architect
http://www.ibm.com/software/integration/datapower/
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com