Hello,

On 15.10.2014 16:24, Nikos Mavrogiannopoulos wrote:
Hi,
  Concerning: https://bugs.freedesktop.org/show_bug.cgi?id=51949#c3
What are your requirements? We currently have working code (but not yet
merged) for an isolated security module via p11-kit. Our requirements
are to protect private keys by keeping them outside a process' boundary.
FreeIPA has the same requirement in this regard + couple more.

The main target is to run softhsm (v2) in an isolated mode. If we can
This was our plan too :-)

combine efforts would be nice.
Definitely!

The original intent was to design LDAP-backed PKCS#11 module which will be used for CA certificate distribution to clients.

E.g. SSSD would download the CA certificates managed by FreeIPA to client and expose them via PKCS#11 to p11-kit. We hope that this would allow almost seamless CA roll-over.
This is in scope of https://fedorahosted.org/freeipa/ticket/4322

Later we found out that DNSSEC support in FreeIPA needs to distribute and share private keys among all FreeIPA DNS servers. It seems that LDAP-backed PKCS#11 backend could be used for the same purpose.
The idea how it can be done in secure way is described on:
https://fedorahosted.org/bind-dyndb-ldap/wiki/BIND9/Design/DNSSEC/Keys/Shortterm#Keydistribution

We did not get to coding it yet but the very rough idea was to wrap local SoftHSM instance and use SSSD to do two-way synchronization between local HSM and LDAP-backend.

It certainly could be extended to handle user credentials too (SSH private keys or passwords in GNOME keyring?).

Jan Cholasta (CCed) can add more details, he is the main architect of this solution :-)

--
Petr^2 Spacek

_______________________________________________
Freeipa-devel mailing list
Freeipa-devel@redhat.com
https://www.redhat.com/mailman/listinfo/freeipa-devel

Reply via email to