[RFC 1/2] Add support for openssl engine based keys

Blumenthal, Uri - 0553 - MITLL uri at ll.mit.edu
Sat Nov 4 01:34:35 AEDT 2017


         >>  Let me rephrase my question: what does using OpenSSL engines enable
         >>  that we can't already do via PKCS#11?
         >
         > It allows you to use the TPM2 as a secure key store, because there's no
         > current PKCS11 code for it.
         >
         > The essential difference is that Engine files are just that: flat files
         > where the key is stored in a form only decodeable by the engine.
         > PKCS11 tokens are supposed to be represented by tokens and slots which
         > is an active entity storing the key.  So, provided I wrap it correctly,
         > I can create a TPM representation on one system (I have to know one of
         > the hierarchy seeds on the target) transfer the file to the target
         > system and use it;…

What I don’t get is – why not transfer those keys to the target machine “somehow”, load them to the TPM there “somehow”, and then treat TPM as a PKCS#11 device?

If there’s no PKCS#11 “driver” for TPM – then that’s what needs to be added, IMHO.
 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 5211 bytes
Desc: not available
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20171103/323ceb30/attachment.p7s>


More information about the openssh-unix-dev mailing list