On Wednesday 22 June 2005 13:38, Vasil Dimov wrote:
On Wed, Jun 22, 2005 at 01:20:10PM +0100, Colin McKinnon wrote:
On Wednesday 22 June 2005 13:12, Vasil Dimov wrote:
On Tue, Jun 21, 2005 at 10:29:37PM -0700, Peter Pentes wrote:
Sorry, what I am referring to here is actually the passphrase for the private keys, and how Stunnel does not support encrypted private keys.
This would be useless. How do you expect the passphrase for the encrypted private key to be obtained at stunnel startup?
Apache manages it.
Encrypted private keys will prevent stunnel from automatic startup, after a power failure or some other accidential machine reboot.
Exactly. If it's simply a choice between having the facility or not, then by implementing it, it provides the systems owners with more choices. In some contexts it may be appropriate for an operator to control the boot-up process - denying access to network resources would be a good way of enforcing this.
....and it also presents the opportunity of supplying the certificate at runtime via a non-secure network protocol such as TFTP or NFS, and reduces issues with security of backups.
But yes, storing the passphrase on the same system makes no sense.
C.