[Opendnssec-develop] SoftHSM

Rick van Rein rick at openfortress.nl
Tue Dec 2 11:53:15 UTC 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

Thank you for the good discussion topics on this list.  As introduced by
Roy last week, I've done a lot of PKCS #11 application development at
OpenFortress, and will try to add my twopence to this discussion.

> To be clear, OpenDNSSEC is also capable of using a real HSM, one that 
> might store keys for encryption purposes as well. So if a pkcs11 template 
> is generated for a request, I'd like to contain CKA_SIGN=TRUE (at least) 
> and maybe even CKA_DECRYPT=FALSE.

There are several CKA_xxx attributes, and many are worthwhile to use.
Among my favourites are the flags that tell the PKCS #11 implementation
to avoid export, and to enforce keys having been generated on-token.

It has been my experience (mainly with USB tokens and smart cards) that
support for the CKA_xxx flags is not proper and complete for most of the
tokens, making many libraries will fail if you are over-explicit.  I've
been talking to quite a few manufacturers and got such flags implemented,
but count on a period of months to wait before any middleware is improved
if you rely on CKA_xxx flags too heavily.  My impression is that most
token middleware is developed to work with a few browsers and a handful
of mailers, and then shipped off.  The remaining flags often remain as
TODO items until someone complains about them.

> In short, the softtoken does need to 
> understand (or ignore, but not fail) those attributes.

This is precisely what worries me.  Ideally, I'd agree.  Practically though,
it may be a serious show-stopper when deploying the OpenDNSSEC daemon on a
given piece of hardware.

The nuisance of this is that OpenDNSSEC, to be practical, would have to be
configurable for the CKA_xxx flags it relies on, just to make up for any
half-done middlewares.  I'd love to believe that HSM manufacturers are
doing better, but honestly I doubt it.


Cheers,

Rick van Rein
OpenFortress Digital signatures
http;//openfortress.nl/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Comment: New to PGP? http://openfortress.nl/doc/essay/OpenPGP/index.nl.html

iD8DBQFJNSGPFBGpwol1RgYRAtF+AJ4okhWWklj0Ss8yQqZWjg1DbXpDcgCfToT2
m1drDbB5z55XoQDNtOHZQ5Q=
=2UYu
-----END PGP SIGNATURE-----



More information about the Opendnssec-develop mailing list