-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How is trust revoked on pkc #1
Comments
I have some side questions / remarks openjdk provided on centos stream has restrictions on the ecc curves it supports, so it's not possible to validate for example, a certificate for a X9_62_c2tnb431r1 curve. So it would be great to provide an official container image for the validator. Personally I built one with
that can be used to validate any curve without the limitations imposed by Red Hat. another thing a pkc generated on dpod will fail validation with "Error: Root CA verification failed. Fingerprint does not match." with the provided root ca cert as luna-pkc-validator compares the cert fingerprints and not only the modulus values which stay the same. also I notice the pkc contains a couple of extensions like "1.3.6.1.4.1.12383.2.3" (which looks like it could provide a firmware version). Is it possible to parse this, and could this be used to reject certificates created with older unsafe versions? (or are keys kept during firmware upgrade, so the pkc is in the end, offers no guarantee of non-extractability for ecc keys). a last question regarding those X509 extensions, is it possible to know if a key has an associated CKA_UNWRAP_TEMPLATE and its content? I'd like to give users a public RSA key and prove that it can be used to safely import AES secrets that will not be extractable. |
The tool purpose is to validate the pkc chain. It is end user responsibility to update the vulnerable firmware on the HSM. |
DPOD is using the same public/private key pair but signed with SHA384 and tool is validating the Message Digest of certificate as a result it is failing . |
hello,
that's understood however the tool goal is to achieve what is described here: https://thalesdocs.com/gphsm/luna/7/docs/network/Content/admin_partition/confirm/confirm_hsm.htm
the tool does not help with this since a valid pkc chain does not prove that the private key is reliable. To achieve this goal the tool needs to also have a way to revoke certificate for HSM that cannot be trusted. |
hello! thanks for this tool.
I would like to know if there is a way to improve it to validate that the key was not generated on (or transited through) a known vulnerable HSM that leak keys (I also asked the question on https://github.com/orgs/pkic/discussions/32). A pkc for a key generated on a vulnerable HSM still validates OK with this tool.
The text was updated successfully, but these errors were encountered: