Not long after getting my TPM chip to protect SSH keys in
a recent blog post ,
it started to become obvious that OpenCryptoKi was not the best solution. It's large,
complicated, and, frankly, insecure. I dug in to see if I could fix it, but there was too
much I wanted to fix, and too many features I didn't need.
So I wrote my own. It's smaller, simpler, and more secure. This post is about this new
solution.
Why not Opencryptoki?
It generates at least some keys in software. As I've explained earlier,
I
want to generate the keys in hardware .
It generates migratable keys. This is hardcoded, and some people obviously
want migratable keys (for backup purposes). So a fix would have to involve
supporting both.
Opencryptoki has no way to send such parameters from
the command line key generator to the PKCS11 library. So not only would I
have to implement the setting , but the whol...
Comments
Post a Comment