On 02/10/2010 12:18 PM, Andreas Jellinghaus wrote:
> Am Mittwoch 10 Februar 2010 17:59:18 schrieb Daniel Kahn Gillmor:
>> All spelled out, my proposal is:
>>
>>  * the filesystem can supply certificates, certificate requests, or raw
>> public keys in ~/.eid/authorized_certificates
>>
>>  * pam_p11 extracts the RSA public key from these, to create a set of
>> public keys.
>>
>>  * the card produces a set of public keys bound to authentication slots,
>> either embedded in X.509 certificates or as raw public keys.
>>
>>  * the system finds the first public key which is in both sets, and asks
>> the user to authenticate to the corresponding slot on the card
>>
>>  * the system grants the authentication based on whether the card can
>> properly compute the response to the RSA challenge using the
>> user-supplied PIN.
>>
>> Does that make it clearer?  I probably should have written it up like
>> that earlier.
> 
> ok, sounds nice. not sure how many users want to use CSR or pubkeys instead
> of certs, but if these formats can be detected easily, then it is propably
> not too much code to read them and extract the public rsa key, no matter
> which format was used. but I have little clue about openssl API, so I
> can't tell.

the openssl API is a bit hairy but i don't think it'll be too horrible.
 i might also drop the CSR option in that first step, because it's just
a really weird carrier for a public key; far less likely than a raw
public key.

and if we're adding weird public key carriers, i can think of other ones
i'd prefer to an X.509 CSR.

> no issue at all. hope you don't mind me closing it maybe a bit too fast.

not a problem.  it was a good incentive for me to clarify what i was
talking about ;)

        --dkg

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to