On Tue, 2014-12-09 at 13:15 +0000, Martinsson Patrik wrote:
> So, If I don't have opensc-module, one way or another in
> (sql):/etc/pki/nssdb I will loose all functionality that gsd brings me,
> for example "lock screen at card removal". 

Not sql:/etc/pki/nssdb; this is another one that that uses the legacy
database format in /etc/pki/nssdb instead. Just to add to the fun :)

> If this implementation is wrong and should be done in another way I
> cannot answer for. I just know what works and what doesn't. 

If it's not honouring the p11-kit configuration, then it's broken. I
filed https://bugzilla.gnome.org/show_bug.cgi?id=741293

Yes, adding OpenSC (or p11-kit-proxy) to /etc/pki/nssdb/secmod.db will
help to work around the problem.

> - I've now verified that both the "Login" keyring and the "gnome2
> key storage" gets my PIN as password when logging in the first time.
> This is fine, I like this approach.

I don't. Your certificate is two-factor authentication — a combination
of something you have (the smartcard itself), and something you know (a
PIN).

Some people might have a trivial PIN such as 123456 on their device on
the basis that the PIN is useless without the device itself. Or no PIN
at all.

Using the PIN *alone* as the encryption key for your secrets (or your
whole home directory, in the case of ecryptfs which is going to do
something similar) is a *BAD* idea.

But we digress... :)

> - What is "Gnome2 Key Storage"-kerying anyway, what is it actually used for. 
> Everything seems 
>   end up in "Login"-keyring anyway ? I'm confused. 
> 
> > You didn't actually want to *use* it for PKCS#11 anyway.
> 
> - Isn't there a reason for gnome-kering.module to be a pkcs11 module you mean 
> ? 

It's cute that GNOME keyring can provide PKCS#11 functionality and you
can store certificates and keys in there. But you aren't *using* that
functionality. So just unregister the module entirely by deleting its
file from /usr/share/p11-kit/modules/. Then you don't have to worry
about its behaviour, or the apps which don't support the protected
authentication path. Life's too short :)

> /Me is getting more confused for every day that passes ;)  

Yeah, this stuff is painful, but thanks for helping us work through it.

We *really* need to get to a point where all applications in a system
will *consistently* use the PKCS#11 modules configured in p11-kit,
regardless of which crypto library they're using. And all command-line
references to certificates/keys will accept PKCS#11 URLs as well as
filenames.

Precisely *how* NSS gets there, it doesn't really matter — whether it's
adding p11-kit-proxy.so to {sql:,}/etc/pki/nssdb by default and actually
making applications *use* that directory (qv.), or by symlinking
libnssckbi.so to p11-kit-proxy.so or actually adding proper *native*
support for p11-kit for loading the right modules at the right time.

With p11-kit-trust we have made great progress — at least we can now
have a consistent trust database, maintained by the sysadmin and
reliably used by *every* application that needs it. Next we need to sort
out the rest of the story...

-- 
dwmw2

Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to