On Mon Nov 24 21:42:58 2014, pspacek@redhat.com wrote:
> Hello,
>
> and thank you for your answer!
>
> On 15.11.2014 00:20, Francis Dupont via RT wrote:
> > I am currently out of my office (~12000 km) and
> > I'll go back in some hours, so I apologise for
> > the likely delay for a detailed answer.
> >
> > BTW there is a new PKCS#11 standard (specs
> > still required a final vote, include files are not
> > yet available) but it won't change something as
> > HMAC has been covered since a long time.
> >
> > The native PKCS#11 supports *all* the standard
> > crypto functions needed by named, including hash
> > and HMAC. So there is nothing to change on this side.
> >
> > If I understand well you'd like to put secrets in the HSM.
> Yes, exactly.
>
> > Currently this is supported only for RSA and ECDSA
> > key pairs (look for a fromlabel methos in dst_funct
> > arrays. Note for OpenSSL only RSA keys are supported
> > (sound as ECC is not supported by the PKCS#11
> > OpenSSL engine).
> I'm thinking more about direct/native PKCS#11 support.
=> I agree and I just commented the fact the OpenSSL
stuff is already far behind..
> OpenSSL's PKCS#11
> engine never worked for me and generally with standard
> Red Hat packages ...
=> not really surprised (I wrote the native PKCS#11 code
because the OpenSSL PKCS#11 engine was impossible
to debug/maintain/support... it started as a private
experiment but It was so successful it was adopted
for official distribs)
> > Anyway it seems reasonable to extend fromlabel to
> > HMAC secrets as HMAC is already in the DST stuff.
> > Now I need the opinion of my colleagues if the result
> > will be to get a PKCS#11 specific feature.
=> I postpone this point as the next one is required
if we want to go further.
> > Note I don't yet fully understand your point about
> > rndc tsig-list. I am afraid the current only way to
> > configure TSIG keys (aka secrets) is to put them
> > in the named config file... Surely something which
> > requires ASAP improvements...
>
> You understand me perfectly. I was making the point that
> TSIG keys stored in key files (produced by dnssec-keygen)
> located in "keys-directory" are ignored
> by named and and are not usable in zone "update-policy".
>
> Maybe this could be a way how to separate keys from
> named config file and to allow dynamic key management
> at run-time (with an equivalent of rndc loadkeys
> for these TSIG keys).
=> IMHO this is enough to get its own ticket
(I leave my colleagues to create it in the case they agree).
Thanks