On Thu, Oct 29, 2009 at 10:38:15AM -0600, Gary.Morton at Sun.COM wrote:
> On 10/29/09 09:50, Wyllys Ingersoll wrote:
> >Will Fiveash wrote:
> >>On Thu, Oct 29, 2009 at 02:42:22PM +0000, Darren J Moffat wrote:
> >>> Wyllys Ingersoll wrote:
> >>>>The problem I recall is that I think the SCA6000 requires login even 
> >>>>for
> >>>>accessing public objects and "pktool list" without the logging in
> >>>>resulted in no objects being found.
> >>> Hmn, okay at least if I remove CKF_LOGIN_REQUIRED from softtoken 
> >>>that fixes  the most common use case.   So maybe leave pktool alone 
> >>>then.
> >>
> >>It also sounds like the SCA6000 is broken in regards to requiring login
> >>to access public objects.
> 
> We don't support public token objects at all.

It'd be nice to have a flag for that.  CKF_LOGIN_REQUIRED isn't it, just
the closest to it.

There are several things we can do here:

a) make softtoken not set CKF_LOGIN_REQUIRED (Darren agrees, and, I
   think, we all do);

b) make SCA6000 not set CKF_LOGIN_REQUIRED and explicitly not support
   public objects (if you try to create one, you get an error);

c) make pktool(1) not prompt for PIN when searching for public objects
   (users trying to list SCA6000 objects will see none, and will have to
   know to ask for private objects);

d) make pktool(1) not prompt for PIN when searching for public objects
   unless some cli option is given that tells it to do the login
   anyways;

e) make the PKINIT pre-auth plugin search for public objects without
   first doing a C_Login(), and then return an error / skip PKINIT if
   there are no suitable certs in the token;

f) same as (e), but with a krb5_get_init_creds_option / krb5.conf option
   to force login (so one can store certs as private objects, for
   privacy protection reasons).

I think we all agree on (a) and (e).  (f) would be nice.  I'm not sure
if (b) makes sense.  I like (c) and (d), but we might not reach
consensus on those.

Nico
-- 

Reply via email to