GitXplorerGitXplorer
i

pkcs11-proxy

public
22 stars
9 forks
4 issues

Commits

List of commits on branch master.
Verified
db8e8e595e5a8a416a6211cfdec5f22af948462d

Update README.md

iiksaif committed 6 years ago
Unverified
f6aaa7857557725f9abc18361db040c83b957eef

README.md: display code correctly.

iiksaif committed 9 years ago
Unverified
13f9407cf8b1c046996c80d4bb42b5fc0b1e22dd

USAGE -> README.md

iiksaif committed 9 years ago
Unverified
4e6f52333f1b2fb29d01f54dffe68c75faddc3c5

doc: add USAGE file

committed 14 years ago
Unverified
76194763969283393f19c9b40144c41db449d50b

pkcs11-proxy: exit gracefully when no socket is defined

committed 15 years ago
Unverified
6d83d2fe8fe50fbaff752c0aa297490da0215323

pkcs11-daemon: disable win32 console

committed 15 years ago

README

The README file for this repository.

PKCS11-Proxy is a proxy for the PKCS11-library.

This project is based on a stripped down Gnome Keyring without all gnome dependencies and other features.

The proxy tunnels PKCS11-requests over the network. One possible use is to store cryptograhic information on a seperate server. This way the crypto it can be isolated from the rest of the system. Beware: the connection is not encrypted and can easily be sniffed. You should use a secure communication-channel, for example stunnel.

Here is an example of using pkcs11-proxy together with SoftHSM (from the OpenDNSSEC project). The benefit of this setup is that no extra hardware is needed at all. This could also be considered the greatest weakeness. For demonstration purposes, however, security is not a consideration.

$ sudo adduser cgielen pkcs11
$ sudo adduser cgielen softhsm

$ softhsm --init-token --slot 0 --label test
The SO PIN must have a length between 4 and 255 characters.
Enter SO PIN:
The user PIN must have a length between 4 and 255 characters.
Enter user PIN:
The token has been initialized.

$ PKCS11_DAEMON_SOCKET="tcp://127.0.0.1:2345" pkcs11-daemon /usr/lib/libsofthsm.so
$ PKCS11_PROXY_SOCKET="tcp://127.0.0.1:2345" pkcs11-tool --module=/usr/lib/libpkcs11-proxy.so -L Available
slots: Slot 0           SoftHSM
  token label:   test token manuf:   SoftHSM token model:   SoftHSM
  token flags:   rng, login required, PIN initialized, token initialized,
  other flags=0x40 serial num  :  1

Another implementation can be found at https://github.com/hajikhorasani/cryptokimpx