View | Details | Raw Unified | Return to bug 1371 | Differences between
and this patch

Collapse All | Expand All

(-)dd/ChangeLog.pkcs11 (+112 lines)
Line 0 Link Here
1
20080424
2
 - (alonbl) Add scp -# parameter.
3
4
20080331
5
 - (alonbl) Rebase to openssh-4.9.
6
7
20080210
8
 - (alonbl) Fix typeo in add id message.
9
 - (alonbl) Release 0.23
10
11
20080109
12
 - (alonbl) More cleanups.
13
 - (alonbl) Add manpages updates.
14
 - (alonbl) Release 0.22
15
16
20080108
17
 - (alonbl) I was not aware of the fact that askpass can be
18
   used in the agent environment.
19
   The PKCS#11 patch now use the standard ssh-askpass interface.
20
   So you must have one available at your system.
21
   Removed the prompt-prog argument from ssh-add.
22
 - (alonbl) The patch is now a tarball with split patches.
23
 - (alonbl) Releae 0.21
24
25
20071229
26
 - (alonbl) Indent file to meet BSD styles.
27
 - (alonbl) Modify parameters (again) to meet BSD styles.
28
   I truly regret that I keep modifying the parameters, I believe
29
   this is not the last time, as I don't have full cooperation of
30
   upstream.
31
   Get provider keys:
32
   	Old:
33
		ssh-add --pkcs11-show-ids ...
34
	New:
35
		ssh-keygen -K provider_info
36
   Add key:
37
	Old:
38
		ssh-add --pkcs11-add-id ...
39
	New:
40
		ssh-add -I id [session_cache [cert_file]]
41
42
   Agentless operation (not recommended, OpenSC compatibility):
43
   	New:
44
		ssh -# provider_info ...
45
46
   Because I don't wish to add more switches, I added a format
47
   for provider information:
48
	lib[:prot_auth[:private_mode[:cert_is_private]]]
49
   For most implementations specify only the library name.
50
 - Rebase with openssh-4.7p1.
51
 - (alonbl) Release 0.20
52
53
20070209
54
 - (alonbl) Fixed typeo in X.509 detection, thanks for "Sandro Wefel".
55
 - (alonbl) Release 0.19
56
57
20070105
58
 - (alonbl) Removed pkcs11-helper since it is now a standalone library.
59
 - (alonbl) Default is PKCS#11 support is disabled, to enable configure
60
   with --with-pkcs11
61
 - (alonbl) Rebase with openssh-4.5p1.
62
 - (alonbl) Release 0.18
63
64
20061023
65
 - (alonbl) Removed logit from ssh-agent, thanks to Denniston, Todd.
66
 - (alonbl) Release 0.17
67
68
20061020
69
 - (alonbl) Major modification of ssh-add command-line parameters.
70
   Now, a complete serialized certificate needs to be specified, this
71
   in order to allow people to add id without forcing card to be available.
72
   But to allow complete silent addition a certificate file also needed.
73
   --pkcs11-show-ids is used in order to get a list of resources.
74
   --pkcs11-add-id --pkcs11-id <serialized id> \
75
      [--pkcs11-cert-file <cert_file>]
76
 - (alonbl) PKCS#11 release 0.16
77
78
20061012
79
 - (alonbl) OpenSC bug workaround.
80
 - (alonbl) PKCS#11 release 0.15
81
82
20060930
83
 - (alonbl) Some pkcs11-helper updates.
84
 - (alonbl) Rebase against 4.4p1.
85
 - (alonbl) PKCS#11 release 0.14
86
87
20060709
88
 - (alonbl) PKCS#11 fixed handling multiproviders.
89
 - (alonbl) PKCS#11 release 0.13
90
91
20060608
92
 - (alonbl) PKCS#11 modifed to match X.509-5.5 patch, works OK with focing
93
   ssh-rsa id.
94
 - (alonbl) PKCS#11 removed --pkcs11-x509-force-ssh argument.
95
 - (alonbl) PKCS#11 release 0.12
96
97
20060527
98
 - (alonbl) PKCS#11 fix issues with gcc-2
99
 - (alonbl) PKCS#11 fix issues with openssl-0.9.6 (first) version.
100
 - (alonbl) PKCS#11 modified to match X.509-5.4 patch.
101
 - (alonbl) PKCS#11 add --pkcs11-x509-force-ssh argument to force ssh id out
102
   of X.509 certificate.
103
 - (alonbl) PKCS#11 release 0.11
104
105
20060419
106
 - (alonbl) PKCS#11 fix handling empty attributes.
107
 - (alonbl) PKCS#11 release 0.10
108
109
20060404
110
 - (alonbl) PKCS#11 code sync.
111
 - (alonbl) PKCS#11 release 0.09
112
(-)dd/README.pkcs11 (+47 lines)
Line 0 Link Here
1
The PKCS#11 patch modify ssh-add and ssh-agent to support PKCS#11 private keys
2
and certificates (http://alon.barlev.googlepages.com/openssh-pkcs11).
3
4
Implementation is based on pkcs11-helper (http://www.opensc-project.org),
5
it allows using multiple PKCS#11 providers at the same time,  handling card
6
removal and card insert events, handling card re-insert to a different slot,
7
supporting session expiration.
8
9
A valid X.509 certificate should exist on the token, without X.509 support it is
10
exported as regular RSA key. Self-signed certificates are treated as RSA key and
11
not as X.509 RSA key.
12
13
If you like X.509 (http://roumenpetrov.info/openssh) support apply the X.509
14
patch AFTER the PKCS#11 patch. You may use -o PubkeyAlgorithms=ssh-rsa in order to
15
authenticate to none X.509 servers.
16
17
Please notice that a program such as x11-ssh-askpass must be installed on your system
18
to use smartcards with the agent.
19
20
Usage can be printed using the following commands:
21
$ ssh-keygen -h
22
$ ssh-add -h
23
$ ssh -h
24
25
A common scenario is the following:
26
$ ssh-agent /bin/sh
27
$ ssh-add -K /usr/lib/pkcs11/MyProvider.so
28
$ ssh-add -I 'serialized id'
29
$ ssh myhost
30
31
In order to see available objects, you can use:
32
$ ssh-keygen -K /usr/lib/pkcs11/MyProvider.so
33
34
In order to add id without accessing the token, you must put the certificate in
35
a PEM file and use:
36
$ ssh-add -I 'serialized id' -1 my.pem
37
38
Agentless configuration is also supported but not recommended, it loads all
39
available keys from provider:
40
$ ssh -# /usr/lib/pkcs11/MyProvider.so host1
41
42
In order to debug open two shells:
43
1$ rm -fr /tmp/s; ssh-agent -d -d -d -a /tmp/s
44
45
2$ SSH_AUTH_SOCK=/tmp/s; export SSH_AUTH_SOCK;
46
2$ [ssh-add]...
47

Return to bug 1371