-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please make tuftool more HSM friendly #537
Comments
Hi @udf2457 - thanks for the interest!
|
I don't quite understand the Yubikey use case well enough to understand if our current traits would support it. How would you use tuftool with a Yubikey? |
@webern TL;DR the Yubikey presents as PIV to the host, which means any compatible third-party tool that can be pointed to the I believe I think this is probably the correct starting page for more info about the lib: https://developers.yubico.com/yubico-piv-tool/YKCS11/ Note that I'm talking about the Yubikey here, rather than the (more expensive) Yubi HSM product which IIRC talks to the host in slightly different way (but I suspect like many people, I can't afford a Yubi HSM to play with !). |
I was searching for "rust" "libykcs11" and didn't come up with much. Even so, I'm thinking that library dependency wouldn't be something we would want to take on in the tuftool build. That makes me wonder if we could move to a plugin system so that not every key source would need to be compiled into the tuftool code (i.e. so that key types could be used with tuftool without forking the project). |
@webern Whilst I'm no subject-matter expert, I'd think perhaps "pkcs11" is what you ought to be searching for ? Reverting back to my The
Whilst I agree wholeheartedly with your general suggestion of a plugin system to enable support for obscure sources, I would also argue the other side of the coin that PKCS#11 is perhaps worthy of first-class support ? |
maybe this might be of interest: https://github.com/iqlusioninc/yubikey.rs Also Yubico themselves publish something for use with the YubiHSM series : https://github.com/Yubico/yubihsmrs |
At present,
tuftool
is largely written from the perspective of storing keys on-disk in files.For people who use PKCS#11 (e.g. Yubikey) or cloud HSM (e.g AWS KSM or Azure KV) it would be very useful to be able to:
The text was updated successfully, but these errors were encountered: