Mon Feb 7 10:29:41 EST 2005
5.1. Secret keys are very sensitive information and all available
steps should be taken to protect them on every host on which they are
stored. Generally such hosts need to be physically protected. If
they are multi-user machines, great care should be taken that
unprivileged users have no access to keying material. Resolvers
often run unprivileged, which means all users of a host would be able
to see whatever configuration data is used by the resolver.
The analogy I used is writing the combination to your locker on the
front of your locker. Most people will simply pass by... but the
occasional person is going to take that as an invitation.
More information about the OCLUG