On 11/06/2014 04:08 PM, Mike Gerow wrote:
Thanks for the quick reply! I can see how caching the PIN would have
its issues, but I'm not interested in having NSS ask for the PIN once
and save it, but in configuring it to just use a provided PIN in the
first place.
Still has the same issue, if you configure a pin, but don't tie it to a token (rather than a slot), you could have that pin applied to the wrong device. The functionality you described above is what servers do (the user configures the password for a set of tokens beforehand, not automatic pin caching.

As I think about this more, though, I guess the solution might lie on
the PKCS#11 module side instead of in NSS, in that the token shouldn't
have its CKF_LOGIN_REQUIRED flag set (and of course be configured so
as not to require C_Login to be called before doing cryptographic
operations).
You are correct. If you don't have CKF_LOGIN_REQUIRED set, NSS won't prompt for the password. That's how NSS keeps from getting password prompts when doing raw SSL (the internal crypto services slot is separate from the database slot and doesn't require a password). In FIPS mode you will get password prompts when doing raw SSL.

bob

But now my problem is that I have to convince opencryptoki to do
something it probably doesn't want to :-). Oh well, thanks again for
cluing me in.



No problem

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

-- 
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to