[Swan-dev] [cryptography] Announcing Mozilla::PKIX, a New Certificate Verification Library (fwd)

Philippe Vouters philippe.vouters at laposte.net
Thu Apr 10 20:46:05 EEST 2014


Paul,

Although it is very insecure, would embedded systems be the reason of 
your xauthby=alwaysok ?
This is aside from the NSS database aspect.

Philippe Vouters (Fontainebleau/France)
URL: http://vouters.dyndns.org/
SIP: sip:Vouters at sip.linphone.org

On 04/10/2014 06:37 PM, Lennart Sorensen wrote:
> On Thu, Apr 10, 2014 at 12:17:02PM -0400, Paul Wouters wrote:
>> The only part where we used openssl was for OCF userland, and these days
>> it is more expensive to offload crypto from userland to kernel than to
>> just do it in userland yourself without acceleration, even on embedded
>> hardware. So we dropped that support. It also required the non-NSS code
>> path.
> A lot of embedded systems would much rather use dedicated crypto hardware
> and save the CPU for other things (like routing and firewalling).
> But hopefully most of the heavy lifting is in the encryption of pacekts
> which is in the kernel.  Rekeying and certificate handling is hopefully
> a very small part of running ipsec.
>
>> Note PSKs are still in ipsec.secrets. So if you don't user certs or raw
>> RSA, you can just run: ipsec initnss at boot and forget about it. If you
>> need to add X.509 certs, "ipsec import file.p12". If you use raw rsa
>> keys, than you need to keep a persistent copy of the nss.db. Note that
>> pluto does not write to the nss db. it is used readonly.
> Well there must be a way to add the persistent raw rsa keys.  Keeping
> around the nss database would not be an option.  We use one central
> database for all config in the system with no exceptions.  Everything is
> populated at boot to where it needs to be (in a ramdisk), and whenever
> config is changed of course.
>



More information about the Swan-dev mailing list