Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

Noncombatant: A dead Quaker. -- Ambrose Bierce


devel / comp.protocols.kerberos / Re: Using PKINIT with ECC

SubjectAuthor
o Re: Using PKINIT with ECCKen Hornstein

1
Re: Using PKINIT with ECC

<mailman.62.1700507387.2263420.kerberos@mit.edu>

  copy mid

https://www.rocksolidbbs.com/devel/article-flat.php?id=440&group=comp.protocols.kerberos#440

  copy link   Newsgroups: comp.protocols.kerberos
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!tncsrv06.tnetconsulting.net!.POSTED.mailman.mit.edu!not-for-mail
From: kenh@cmf.nrl.navy.mil (Ken Hornstein)
Newsgroups: comp.protocols.kerberos
Subject: Re: Using PKINIT with ECC
Date: Mon, 20 Nov 2023 14:09:07 -0500
Organization: TNet Consulting
Lines: 20
Message-ID: <mailman.62.1700507387.2263420.kerberos@mit.edu>
References: <8984fe41-f9a0-434b-a09c-df2bc88125dc@sec4mail.de>
<ae76ed5c-1399-401e-988c-ed2dbdfff6e7@mit.edu>
<202311191700.3AJH0hJD016758@hedwig.cmf.nrl.navy.mil>
<51e3d01f-4c52-490b-a0c0-f1ebbbe436e3@mit.edu>
<202311201909.3AKJ96j2009434@hedwig.cmf.nrl.navy.mil>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Injection-Info: tncsrv06.tnetconsulting.net; posting-host="mailman.mit.edu:18.7.21.50";
logging-data="12373"; mail-complaints-to="newsmaster@tnetconsulting.net"
To: kerberos@mit.edu
DKIM-Filter: OpenDKIM Filter v2.11.0 unknown-host (unknown-jobid)
Authentication-Results: mailman.mit.edu;
dkim=pass (1024-bit key, unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=H4VRpZ+r;
dkim=pass (2048-bit key,
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=Nz2RqkkL
Authentication-Results: mit.edu; dmarc=pass (p=reject dis=none)
header.from=cmf.nrl.navy.mil
Authentication-Results: mit.edu; arc=pass smtp.remote-ip=18.9.3.18
ARC-Seal: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1700507385; cv=pass;
b=I/n996Og33tVcDa9kfyYvytmb987m2rr3mDIQZf9PsrGW7XEJKS6Dbo1SWcS+rr+HGL2yvtmWkDTmZGUJv+u17dYryhqumZTAPNLeRntrRAGAI4bju2U6QG7VZ0weSV0YdQz1v0FCbL47OPXHwFWetsOn+WnWANvMpFeVzjaEOYCJnb+DERVltZ6smZUSDYL1EsNSPtaa9aGyPqQGAODjuMT+iULOym4XNXXjPERaSwyUmvFc1BsmHLxw54HOZr2uUSioXNJOOE2DFh8dUaO3jw9L5mKEF4fdYRB2+WsCvrWeim6ta2kL/5ol4G/LvNpHnONqqadnTmKm/dXR07cVg==
ARC-Message-Signature: i=2; a=rsa-sha256; d=mit.edu; s=arc; t=1700507385;
c=relaxed/relaxed; bh=QESEecSpqAa9x4hrn8xTG1vUkx/P9ACj6vWv/Aa2oyM=;
h=Message-ID:From:Subject:MIME-Version:Content-Type:Date;
b=MytMuMs0puyTEQeFYZtJS4ZwNQBT4rO/T7WBifn27dKepW/6xFvjnuMQmNQkC1puq9RhcIGvmOnYdrjZXuA0QrwFL1m01SUMWfkJ+7RRisgcKdIUjFvBEMW7Zj1BlMZZyQ7UFUmoLasGjS8SN18ftAbc9bNHlSySM5gocSNj67Qn5BLR1cSIYdjOywbXC5xqmVePWKBR3aEowXhH0v0D0zq4hfgNELjQ+tAdJLH9dUD1fDPaHLUmv3hUTzospnu7+Sc4407HHsm9Jsq5Be1axvUKzGhyqyzxiDRWy9D8ShU/Qj6PqR1sKD5FF8TWqm0k/zZGZXrCb/fU1xGTt0X+RA==
ARC-Authentication-Results: i=2; mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=H4VRpZ+r;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=Nz2RqkkL
Authentication-Results: mit.edu; dkim=pass (1024-bit key;
unprotected) header.d=mitprod.onmicrosoft.com
header.i=@mitprod.onmicrosoft.com header.a=rsa-sha256
header.s=selector2-mitprod-onmicrosoft-com header.b=H4VRpZ+r;
dkim=pass (2048-bit key;
unprotected) header.d=nrl.navy.mil header.i=@nrl.navy.mil header.a=rsa-sha256
header.s=s2.dkim header.b=Nz2RqkkL
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none;
b=PEGhqdf2SA9KxmdIKElEh+o1Uou7C4sl26xtgg5Kstv8JnTZR5nDh3N7itU5jmdPIsIw0DWPLEMwMeK5jeK4O60pqAsqFC5QkbdCeZoSmp5YFh31eyYe9VArLjVFmoLVnueDB0TX49x9uz6Bjese674viyiwJTdWcwUlbLiGiKHQXpWdlwhc1r1Gm1oy8Ke7LLzKYw2kurA0mb39wW3s5E8sS8GImxluSK9CyUsmsvEIck/hKjSWxTFp/5IxfM1c79c4mmPD26bUCCaLatQ4ijC0Ld4h68tQBLT3IXdk2pN2IQU21zfpxcsiHyqeBDZULCM/3YdCfsQbL26rWzqbBA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
s=arcselector9901;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
bh=QESEecSpqAa9x4hrn8xTG1vUkx/P9ACj6vWv/Aa2oyM=;
b=Bu3g4Glb+/nhLbxbh8+U1KhgCX3D6uKppk2eCRsm1XmT8cony5iZUsLCRp+0nSnSQ5LbDEiVpsxO+kc2pysfySoBad/GATXHPgdDHf3e0202A1mGZc7IopD9tfAJJrSKYp/IdnESH40rXtoUaGFHOrybJ7FhWLlWbEI/CmaneCOBFalD3TanTuyuubAziIXIrU0JwQR5r11FW7RjN1bPeANdSKipPBDvpScnxZDiSYimSYPvsU4O+YNEn+wniDpo1FPBNIzucKFnmVqGWKdqpMg3CemveGj9Sd3aMMn0lCXvb1/wiAlLc7Ylx/wujzSehAAUtysOHyaKnzbAb9aAVA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is
140.32.59.234) smtp.rcpttodomain=mit.edu smtp.mailfrom=cmf.nrl.navy.mil;
dmarc=pass (p=reject sp=reject pct=100) action=none
header.from=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil; arc=none (0)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=mitprod.onmicrosoft.com; s=selector2-mitprod-onmicrosoft-com;
h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
bh=QESEecSpqAa9x4hrn8xTG1vUkx/P9ACj6vWv/Aa2oyM=;
b=H4VRpZ+rKDnhZdRwJoBhRIdKVYakBC2krH/noxECPC5igA9GXag0aY4yH0VYvDaCDkDwbh/4xRpCevtR+3goICKHqsWmOfcPqqE75dqt7UsZNLAdDLDW0gSGMKTRi6YowMBYX0ok7neY3oCqIH/YkfwEbh4iVqhE0Q8aTdsksiU=
Authentication-Results: spf=pass (sender IP is 140.32.59.234)
smtp.mailfrom=cmf.nrl.navy.mil; dkim=pass (signature was verified)
header.d=nrl.navy.mil;dmarc=pass action=none header.from=cmf.nrl.navy.mil;
Received-SPF: Pass (protection.outlook.com: domain of cmf.nrl.navy.mil
designates 140.32.59.234 as permitted sender)
receiver=protection.outlook.com; client-ip=140.32.59.234; helo=mf.dren.mil;
pr=C
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nrl.navy.mil;
h=message-id : from :
to : subject : in-reply-to : references : mime-version : content-type :
date; s=s2.dkim; bh=QESEecSpqAa9x4hrn8xTG1vUkx/P9ACj6vWv/Aa2oyM=;
b=Nz2RqkkLLmifeSS4UqLYPAy/hiDUp76KPptGLzmtnH0rFY7ISMJyK+GdX+Jmg6UkEmTv
fDAIe7v7pZdExV7mRJQgKLiqpBlf6xkevLnC+mPURpBjjqqIfINsDYOiKbOYsaiMVhYE
nFfUBv4cjZh45MtuvHSh/HRX3XIt/4fdd8XxCSjOJkpdf4pboJ56hYT7BSak6PLYmLka
pqCBOJpP4Q3CNx1lhh4O/RkbhwR0uPS9J34FWMJW/x8OtJb/2rAdrQ7hZTczMfIIovxF
oHtfnBGkvsZZDxj6pQphchJd5m47ac5BNP4tviPaqqyUBqaLcwz3oa9Nds4D1oH0/07L Cg==
In-Reply-To: <51e3d01f-4c52-490b-a0c0-f1ebbbe436e3@mit.edu>
X-Face: "Evs"_GpJ]],xS)b$T2#V&{KfP_i2`TlPrY$Iv9+TQ!6+`~+l)#7I)0xr1>4hfd{#0B4
WIn3jU;bql;{2Uq%zw5bF4?%F&&j8@KaT?#vBGk}u07<+6/`.F-3_GA@6Bq5gN9\+s;_d
gD\SW #]iN_U0 KUmOR.P<|um5yP<ea#^"SJK;C*}fMI;Mv(aiO2z~9n.w?@\>kEpSD@*e`
X-NRLCMF-Spam-Score: () hits=0 User Authenticated
X-NRLCMF-Virus-Scanned:
X-EOPAttributedMessage: 0
X-EOPTenantAttributedMessage: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b:0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: CO1PEPF000044F9:EE_|CO1PR01MB7337:EE_
X-MS-Office365-Filtering-Correlation-Id: 7dd173c2-785f-4d82-39dd-08dbe9fc2c81
X-LD-Processed: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b,ExtAddr
X-MS-Exchange-AtpMessageProperties: SA
X-MS-Exchange-SenderADCheck: 0
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:140.32.59.234; CTRY:; LANG:en; SCL:1; SRV:;
IPV:NLI; SFV:NSPM; H:mf.dren.mil; PTR:mfe.dren.mil; CAT:NONE;
SFS:(13230031)(4636009)(39860400002)(376002)(396003)(346002)(136003)(61400799012)(48200799006)(451199024)(64100799003)(5660300002)(2906002)(4744005)(8676002)(316002)(34206002)(786003)(70586007)(68406010)(498600001)(26005)(1076003)(956004)(83380400001)(336012)(426003)(3480700007)(356005)(7636003)(86362001);
DIR:OUT; SFP:1102;
X-Auto-Response-Suppress: DR, OOF, AutoReply
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Nov 2023 19:09:08.8566 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7dd173c2-785f-4d82-39dd-08dbe9fc2c81
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-AuthSource: CO1PEPF000044F9.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: Internet
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR01MB7337
X-OriginatorOrg: mitprod.onmicrosoft.com
X-BeenThere: kerberos@mit.edu
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: The Kerberos Authentication System Mailing List <kerberos.mit.edu>
List-Unsubscribe: <https://mailman.mit.edu/mailman/options/kerberos>,
<mailto:kerberos-request@mit.edu?subject=unsubscribe>
List-Archive: <http://mailman.mit.edu/pipermail/kerberos/>
List-Post: <mailto:kerberos@mit.edu>
List-Help: <mailto:kerberos-request@mit.edu?subject=help>
List-Subscribe: <https://mailman.mit.edu/mailman/listinfo/kerberos>,
<mailto:kerberos-request@mit.edu?subject=subscribe>
X-Mailman-Original-Message-ID: <202311201909.3AKJ96j2009434@hedwig.cmf.nrl.navy.mil>
X-Mailman-Original-References: <8984fe41-f9a0-434b-a09c-df2bc88125dc@sec4mail.de>
<ae76ed5c-1399-401e-988c-ed2dbdfff6e7@mit.edu>
<202311191700.3AJH0hJD016758@hedwig.cmf.nrl.navy.mil>
<51e3d01f-4c52-490b-a0c0-f1ebbbe436e3@mit.edu>
 by: Ken Hornstein - Mon, 20 Nov 2023 19:09 UTC

>I would be happy to have more trace logging to diagnose PKINIT errors,
>but converting every pkiDebug() call probably wouldn't meet the criteria
>for good trace logging. We've already made a few passes in this area,
>most recently one from you which went into release 1.20 (commit
>34625d594c339a077899fa01fc4b5c331a1647d0).

I guess what I was thinking was maybe not EVERY pkiDebug() call, but
more all of the ones that report errors. E.g:

> if ((r = id_cryptoctx->p11->C_SignInit(id_cryptoctx->session, &mech,
> obj)) != CKR_OK) {
> pkiDebug("C_SignInit: %s\n", pkcs11err(r));
> return KRB5KDC_ERR_PREAUTH_FAILED;
> }

There are others than the PKCS#11 calls, of course. I guess what I'd like
(if possible) was that anytime the plugin returned PREAUTH_FAILED, the
debug trace will explain why.

--Ken

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor