On Thu, 2014-12-04 at 22:25 +0000, Martinsson Patrik wrote:
> 
> Maybe I should have been clearer from the beginning, it was actually
> just pam_pkcs11 that didn't automatically picked up my CA, sorry if it
> got confusing.

OK, and I suppose that makes sense. Because pam_pkcs11 doesn't *want* to
blindly trust all those random foreign make-money-fast schemes^W^W CAs;
it wants to trust only the CAs which you have explicitly *configured*
for allowing access to this system.

But that's actually perfect.

Symlink /usr/lib64/libnssckbi.so to /usr/lib64/p11-kit-proxy.so so that
the PKCS#11 modules which are configured in p11-kit actually *work* in
those NSS apps which do load libnssckbi.so. Which is fairly much all the
interesting user-facing ones.

And point pam_pkcs11 at its *own* nssdb somewhere else, which doesn't
have libnssckbi loaded. Just import your CA into that nssdb manually.


For the rest of the system, *forget* nsssysinit; it's an experiment
which is past its time and now best forgotten. Install your CA
into /etc/pki/ca-trust, and your libnssckbi.so->p11-kit-proxy.so will
ensure that NSS apps will pick it up appropriately if they want the
system trust.

That should basically solve it all for you, right? Apart from those
recalcitrant apps which can't handle the protected login path.

You can make use of the 'disable-in' option
in /usr/share/p11-kit/modules/gnome-keyring.module to disable it in
those, for now.

-- 
dwmw2

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to