Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

There *__is* no such thing as a civil engineer.


devel / comp.protocols.kerberos / Re: Using PKINIT with ECC

SubjectAuthor
o Re: Using PKINIT with ECCKen Hornstein

1
Re: Using PKINIT with ECC

<mailman.59.1700415207.2263420.kerberos@mit.edu>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=437&group=comp.protocols.kerberos#437

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: kenh@cmf.nrl.navy.mil (Ken Hornstein)
Newsgroups: comp.protocols.kerberos
Subject: Re: Using PKINIT with ECC
Date: Sun, 19 Nov 2023 12:33:10 -0500
Organization: TNet Consulting
Lines: 24
Message-ID: <mailman.59.1700415207.2263420.kerberos@mit.edu>
References: <8984fe41-f9a0-434b-a09c-df2bc88125dc@sec4mail.de>
<ae76ed5c-1399-401e-988c-ed2dbdfff6e7@mit.edu>
<81bc4460-b88a-4dfe-b538-e22805a086ea@sec4mail.de>
<202311191733.3AJHXASl018607@hedwig.cmf.nrl.navy.mil>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="16770"; mail-complaints-to="newsmaster@tnetconsulting.net"
Cc: kerberos@mit.edu
To: Goetz Golla <mit@sec4mail.de>
DKIM-Filter: OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results: mailman.mit.edu;
dkim=pass (1024-bit key, unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=m7Owl8ct;
dkim=pass (2048-bit key,
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=ibr/sJZV
Authentication-Results: mit.edu; dmarc=pass (p=reject dis=none)
header.from=cmf.nrl.navy.mil
Authentication-Results: mit.edu; arc=pass smtp.remote-ip=18.9.3.17
ARC-Seal: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1700415203; cv=pass;
b=HazWTGMnKbZ7YUsUjfxiwRci+Jg2p+CJvOlIDdJCkZmS1peCjJzKo9k4O0q8yfjKFPNuOFeU4aLOxKCIZyu+uQXftX2b1hZauzIQ1YAM1UJCSUdOC8kXbD/a6agA7gQ0NSvqL8BEWORqlFUgkQoibCwXpFCxtjYDK8KIt0KjZ8v5jllAJ1ucI2+6Z9qwhvpUhfeJCv91Nf8QnHNAcSE5YJQYqK3e6pOSHE5kFdc1xAy7NeMEPHvco6hjRlTfAKEGoTMQSZ1rj89h1IzQJoLk7ZfnVsL2VvmKsmRRcBD1eekd/yRJvLnmtXPVlAcQdTpSvmjhGbn7A+PzreJyG/uALQ==
ARC-Message-Signature: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1700415203;
c=relaxed/relaxed; bh=UGJ4tfr+NCftnXemPOlJ6EPZD6QZtUHq2m9j1WTBlXs=;
h=Message-ID:From:Subject:MIME-Version:Content-Type:Date;
b=qd6eRLqX2IhF0/2+TTdOHi7dKWyio6gRNBgVI2FtF5fVAWoQc0g6/hJE3QaEmQFTG+NFD+5DVgd4MetlLOGdP5MluZLJzaGZVvLu9vmeCKvGr87nhivW+UlFaNgZBiHV9yvE4Pqq2WkZIXNvwVCt/YsujnH/jWkG/i7Nhgk+9En82wjOKlQyyb62+QVSlboGgVySgDDeGi5YOOwnB5i8YAv4qqxeWoyJ+gk36rFd8HXQ2SEpWPjKObnlTfAzkk2G2LyungmBHTSGNbouNqAfnOarxJ24BHVqBmqq3TLG5t7/r63Bw7HIGCcS9mOk29kgtlRd08D82Lt7stxJRB4GIw==
ARC-Authentication-Results: i=2; mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=m7Owl8ct;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=ibr/sJZV
Authentication-Results: mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=m7Owl8ct;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=ibr/sJZV
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=hJnHhTri0Yuvo9KxP4RrZXdLTjTAejkhoz/vPvERN9CuZDn61gW+drq/VBJXC3ouObRERLIN4r3g71KUQ3POBZkVAj5YRCT+/hyY1TlZFcTRfLgr1R5QCBJWXt6oC8j8Gg41bH7Fu5I97zhjOuyr376/PCxxI6tyCKIsPi3l2F5R0jeJJ04M2V0ZZmPgBeR1ohV03Or/53bHvYX7Uh7JdRGNtyAtAR3hDAnxTq70SRWefHEeZ9WRNu+YpY8vz2xiGOiY2iAKRM0JEmcYGAJfUYn6R5fwMZUEdwra+Ghe1d6TdRtop9V2O4NkB8eWVOiCb7E/FBBep51M96ozrDuYeg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=UGJ4tfr+NCftnXemPOlJ6EPZD6QZtUHq2m9j1WTBlXs=;
b=mpgufkc2nCrjv+lNjZP9dtxNGfx6qxl70GfWW0gzPpz1NH8EW15l/RIk1KBMpQT9Ar4Zi0BOc9vsyTXD8vGtxCNSOWu3DaUW6GET1JAVJWWdYSoV96JJgm0HLHjzYjXpE3aBOEY2chaPZvRFYapIB6FiW0WtLBd1tsjGAurl+aObHw0i3i5+vm+Pbpa45DFIt24z2UGcRpbFJWwBID33thGtT0oSnkgOtmbEZRqInnnHnphsHNHTux8e8APljn7XY6mA3MOKOzvv1Kfb9cWgvn+xMpmzod/S7oawLxs0gwTREsdwxaYdS/d2323lv5BhSoQx1SlvF0K7WAqidvjIsg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
140.32.61.234) smtp.rcpttodomain=mit.edu smtp.mailfrom=cmf.nrl.navy.mil;
dmarc=pass (p=reject sp=reject pct=100) action=none
header.from=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=UGJ4tfr+NCftnXemPOlJ6EPZD6QZtUHq2m9j1WTBlXs=;
b=m7Owl8ctmxgYSBWbBY6UgtHal497VjDgibqY33I3s0K+NQyIP7CI4vhldpt1Y3oQciDRYfY6nR90wt2X0fSVifrr2RAG1xrsA8y0JMJDi2vc3zGBJdtrLcKdI5KWGWnOUR0dmPyU172bS6Bj4l0k+HJ+hGCW+ndSMzhYiCli0xk=
Authentication-Results: spf=pass (sender IP is 140.32.61.234)
smtp.mailfrom=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil;dmarc=pass action=none header.from=cmf.nrl.navy.mil;
Received-SPF: Pass (protection.outlook.com: domain of cmf.nrl.navy.mil
designates 140.32.61.234 as permitted sender)
receiver=protection.outlook.com; client-ip=140.32.61.234; helo=mf.dren.mil;
pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nrl.navy.mil;
h=message-id : from :
to : cc : subject : in-reply-to : references : mime-version : content-type
: date; s=s2.dkim; bh=UGJ4tfr+NCftnXemPOlJ6EPZD6QZtUHq2m9j1WTBlXs=;
b=ibr/sJZV374WJ0+PqlNHaUwZAmn4XuoRtXQtSOBFuU4huMs4y9n2cdvxsGl3W3QZW/sz
aF1ES1Ze0OMUajNNeR/z0YdTJVF8dFL3OkUemj05oXF9O0e6m+UV3gLSZLdTRAZDg3IE
b/htC5ykkv2Jq/WvQu4QnFfBZfESrW/+8Qn5ARmjxDSkfVA5Vb291XOgkkIwrTJBFFY5
G97UlUkm8ohTo/ovCvaEfXS/jW5+xbZU6bthV6kQeGd7ZRdf2/yEMMBLuoCjEhFhLfzU
eRKSf82pxukC+wEqNzyUruNYV2h2NPLqTT5C3KzbZ1jDxDfl+S5hWuTX6FCYEwRHQYbl zw==
In-Reply-To: <81bc4460-b88a-4dfe-b538-e22805a086ea@sec4mail.de>
X-Face: "Evs"_GpJ]],xS)b$T2#V&{KfP_i2`TlPrY$Iv9+TQ!6+`~+l)#7I)0xr1>4hfd{#0B4
WIn3jU;bql;{2Uq%zw5bF4?%F&&j8@KaT?#vBGk}u07<+6/`.F-3_GA@6Bq5gN9\+s;_d
gD\SW #]iN_U0 KUmOR.P<|um5yP<ea#^"SJK;C*}fMI;Mv(aiO2z~9n.w?@\>kEpSD@*e`
X-NRLCMF-Spam-Score: () hits=0 User Authenticated
X-NRLCMF-Virus-Scanned:
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: DS2PEPF00003444:EE_|IA0PR01MB8238:EE_
X-MS-Office365-Filtering-Correlation-Id: 307c4011-a9d2-493d-b576-08dbe9259b5e
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:140.32.61.234; CTRY:US; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mf.dren.mil; PTR:mfw.dren.mil; CAT:NONE;
SFS:(13230031)(4636009)(396003)(346002)(376002)(39860400002)(136003)(451199024)(48200799006)(61400799012)(64100799003)(2906002)(5660300002)(86362001)(336012)(426003)(7636003)(356005)(83380400001)(498600001)(1076003)(26005)(956004)(70586007)(3480700007)(4326008)(6862004)(8676002)(786003)(316002)(68406010);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Nov 2023 17:33:13.0919 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 307c4011-a9d2-493d-b576-08dbe9259b5e
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: DS2PEPF00003444.namprd04.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR01MB8238
X-OriginatorOrg: mitprod.onmicrosoft.com
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <202311191733.3AJHXASl018607@hedwig.cmf.nrl.navy.mil>
X-Mailman-Original-References: <8984fe41-f9a0-434b-a09c-df2bc88125dc@sec4mail.de>
<ae76ed5c-1399-401e-988c-ed2dbdfff6e7@mit.edu>
<81bc4460-b88a-4dfe-b538-e22805a086ea@sec4mail.de>
 by: Ken Hornstein - Sun, 19 Nov 2023 17:33 UTC

>P:296321; T:0x140609979246400 17:33:26.054 [opensc-pkcs11]
>pkcs11-object.c:697:C_SignInit: C_SignInit() = CKR_KEY_HANDLE_INVALID
>
>So there is some problem with opensc-pkcs11. Interestingly I am using
>the same Yubikey successfully with pam-pkcs11 to authenticate without
>problems.

CKR_KEY_HANDLE_INVALID means "The handle passed is not a a valid key".
Which is not exactly helpful ("handles" in PKCS#11 are nonzero integers
and refer to objects on the card). You MIGHT be running into an issue
where there is a bug in the PKINIT code that makes PKCS#11 calls but
that code has been stable for a long time so I would be surprised if the
failure was there (but, I have been surprised before!). I believe there
is some environment variable or other configuration you can set to get
more debugging information out of opensc but I don't recall it right
now.

However, I believe Yubico provides a PKCS#11 module for Yubikeys; have
you tried that? The OpenSC people usually do a good job in terms of
supporting a wide variety of cards but depending on how old the particular
version of OpenSC you are using is you may be running into a compatibility
issue.

--Ken

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor