Closed Bug 681937 Opened 13 years ago Closed 12 years ago

Enhance PSM's key generation strategy with tokens/escrow

Categories

(Core :: Security: PSM, defect)

6 Branch
defect
Not set
normal

Tracking

()

RESOLVED FIXED
mozilla14

People

(Reporter: KaiE, Assigned: KaiE)

Details

Attachments

(1 file, 2 obsolete files)

Firefox is used to enroll for certificates. A CA may request that the private key is escrowed. (We display a prompt that the user must confirm.)

This bug reports a problem with the following scenario.
- a CA requesting a key of type XYZ
- the CA requesting to escrow the new key
- our software token is unable to generate keys of type XYZ,
  because the respective algorithms are not implemented
- having a supplemental token installed that 
  is able to generate keys of type XYZ

As of today, PSM assumes that we are never able to extract keys from a supplemental token. It therefore attempts to generate a temporary key using our internal code (the software token), then escrow the key, then move the key to the supplemental token, then delete our temporary internal key.

In the above scenario, this fails, because our internal code is unable to produce the key of the desired type XYZ.

This bug proposes to enhance PSM's logic to try more alternatives for generating the key.

With some supplemental tokens, such as external software tokens, it's possible to extract the keys.

Initial improvement:
- change PSM to a use two step approach when generating the key
- attempt to generate the key on the intended token,
  but when doing so, set a flag that requires the key to be extractable.
  (CKA_EXTRACTABLE).
  If the token accepts this requirement, it will succeed,
  and we are done and are able to escrow the key.
- With this flag set, if extraction is not possible,
  the key generation attempt will fail.
- Only in this failure scenario, attempt to generate the key
  using our internal code.

It might be necessary to add new APIs to NSS.
Attached patch experimental patch v1 [untested] (obsolete) — Splinter Review
Assignee: nobody → kaie
Attachment #555725 - Flags: feedback?(rrelyea)
Attached patch experimental patch v2 [untested] (obsolete) — Splinter Review
Attachment #555725 - Attachment is obsolete: true
Attachment #555725 - Flags: feedback?(rrelyea)
Attachment #555730 - Flags: feedback?(rrelyea)
Comment on attachment 555730 [details] [diff] [review]
experimental patch v2 [untested]

r- from a feedback perspective.

First, the idea is great, but there are things that are wrong or doggy with this patch:

1) PK11_GenerateExtractableKeyPair is not necessary PK11_GenerateKeyPairWithFlags() will allow you to set the extractable flag without NSS changes. You can use PK11_GenerateKeyPairWithFlags for all our cases, and simply pass in different flags. That should simplify your if's.

2) Senstive and Extractable are different animals. In general, you want the key to be Senstive (cannot be removed without encrypting). By default tokens will try to make keys both sensitive and non-extractable. Your preferred state for a permanent key is Sensitive = TRUE, even if you are escrowing it.

3) It's not necessary, but I would still generate key key in softoken if we are escrowing and softoken can do the keygen function. That would create less risk of failures with existing RSA tokens.

4) NOTE: the target token may not actually do keygen. Clearly if softoken can't do keygen, you'll have to look for another token that can and still insert the key in the target token.

bob
Attachment #555730 - Flags: feedback?(rrelyea) → feedback-
(In reply to Robert Relyea from comment #3)
> 
> 3) It's not necessary, but I would still generate key key in softoken if we
> are escrowing and softoken can do the keygen function. That would create
> less risk of failures with existing RSA tokens.


I don't know how to query softoken whether it will be able to generate the key.

Am I right in assuming, that you propose:
- don't query softoken ability
- instead, simply try to generate the key in the softoken
- if it works, done
- if above failed, then proceed to create on the destination token 
  with "extractable" set
- if that fails too, bad luck, failure
Attached patch Patch v4Splinter Review
Untested, but will proceed with testing now.

Feedback welcome.
Attachment #555730 - Attachment is obsolete: true
Attachment #588982 - Flags: review?(rrelyea)
> I don't know how to query softoken whether it will be able to generate the key.

PK11_DoesMechanism(slot) ... but really we should probably call PK11_GetBestSlot() to get the mechanism directly. It will return a slot which can do the given mechanism. If it doesn't return a slot, we are done and you can fail.

bob
Comment on attachment 588982 [details] [diff] [review]
Patch v4

r+ The runnable stuff makes it a little harder to follow, but it clearly is necessary (I presume to prevent locking up the UI in keygen).

I probably would have pushed all the logic to a single function that can be called either by the runnable object or by the parent, but this patch fits with the existing code better.

The notion of looking up a different EC device isn't in this patch, but it's a much lower priority issue, I think. The use of the internal slot for RSA is important because it is the only slot we can ask for the key to be extractable on with any confidence.

bob
Attachment #588982 - Flags: review?(rrelyea) → review+
Bob, you gave me an r+, but then you made comments which sound like you are requesting changes. I'm confused.
(In reply to Robert Relyea from comment #7)
> 
> The notion of looking up a different EC device isn't in this patch, but it's
> a much lower priority issue, I think. 


I believe this means: "patch could be improved, not important now"


> The use of the internal slot for RSA
> is important because it is the only slot we can ask for the key to be
> extractable on with any confidence.


I believe this means: "it's good that the r+ patch deals with RSA correctly".
https://hg.mozilla.org/mozilla-central/rev/2e3738aa6670
Status: NEW → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: