Hi *,

On 06/01/15 18:19, Gert Doering wrote:
Hi,

On Tue, Jan 06, 2015 at 04:23:59PM +0000, David Woodhouse wrote:
That is, after all, fairly much what PKCS#11 was *designed* to provide.
Thanks for that hint.  Seems we (as in "the currently active developers")
really need to look more closely into the gifts we inherited :-)

In fact, doesn't such an implementation already exist at
https://github.com/slushpupie/KeychainToken ?
This looks quite promising :-)  (if a bit "dead", hope it still works)

when reading this thread I also thought of "that's what we have pkcs#11 for" . However, a pkcs#11 interface is a clunky thing - we could also consider a different (longer-term) approach:

- create a higher level interface/plugin that allows OpenVPN to use an external certificate store
- this plugin/interface could then have implementations for
  + Microsoft CryptoAPI
  + Mac OS Keychain
  + PKCS#11
  + Linux keyring-like drivers (kwallet? gnome-keyring?)

- the plugin/interface should be able to offer most of what pkcs#11 offers: key+cert storage, possibly offloading of certain encryption/decryption operations.

Writing a pkcs#11 shim that talks to the mac OS keychain, which itself can talk to pkcs#11 drivers seems a bit overkill to me. BTW, the same thing can be said about the MS CryptoAPI: there are pkcs#11 driver shims that utilize the Windows CryptoStore, which itself can use pkcs#11 devices ...

JM2CW,

JJK


Reply via email to