MIME-Version: 1.0 Content-Disposition: inline Subject: Update PKCS #11 OpenSSL engine usage documentation in ARM Delivered-To: bind9-public@bugs.isc.org Date: Sat, 2 Dec 2017 19:53:23 +0530 User-Agent: Mutt/1.9.1 (2017-09-22) Return-Path: X-Original-To: bind9-public@bugs.isc.org Received: from mx.pao1.isc.org (mx.pao1.isc.org [149.20.64.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx.pao1.isc.org", Issuer "COMODO RSA Organization Validation Secure Server CA" (not verified)) by bugs.isc.org (Postfix) with ESMTPS id CD875D78B0A for ; Sat, 2 Dec 2017 14:23:29 +0000 (UTC) Received: from mail.banu.com (mail.banu.com [46.4.129.225]) by mx.pao1.isc.org (Postfix) with ESMTP id 862543B6E1D for ; Sat, 2 Dec 2017 14:23:27 +0000 (UTC) Received: from jurassic.lan.banu.com (unknown [115.118.156.171]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.banu.com (Postfix) with ESMTPSA id 11D8956A0875; Sat, 2 Dec 2017 14:23:25 +0000 (GMT) X-RT-Incoming-Encryption: Not encrypted Message-ID: <20171202142323.GA20227@jurassic.lan.banu.com> From muks@isc.org Sat Dec 2 14:23:29 2017 X-Spam-Status: No, score=0.0 required=5.0 tests=none autolearn=unavailable autolearn_force=no version=3.4.1 content-type: text/plain; charset="utf-8" From: "Mukund Sivaraman" To: bind9-public@isc.org X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mx.pao1.isc.org X-RT-Original-Encoding: ascii X-RT-Interface: Email Content-Length: 303 The description in the ARM about using BIND with PKCS #11 as OpenSSL engine is very obsolete (not available any longer). This ticket should update the ARM with a correct description of how to use BIND with PKCS #11 OpenSSL engine on a modern distribution, with example of usage with softhsm. Mukund