Re: Lighttpd and passphrase protected SSL certificate

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Jan 15, 2012 12:58 PM, "Mauro Santos"
<registo.mailling<registo.mailling@xxxxxxxxx>
@ <registo.mailling@xxxxxxxxx>gmail.com <registo.mailling@xxxxxxxxx>> wrote:
>
> On 15-01-2012 16:38, Audric Schiltknecht wrote:
> >
> > Upstream says (http://<http://redmine.lighttpd.net/projects/1/wiki/Docs:SSL>
redmine.lighttpd.net <http://redmine.lighttpd.net/projects/1/wiki/Docs:SSL>
/projects/1/wiki/ <http://redmine.lighttpd.net/projects/1/wiki/Docs:SSL>
Docs:SSL <http://redmine.lighttpd.net/projects/1/wiki/Docs:SSL>) that
> > the SSL password must be enter manually on each lighttpd start (or to
> > remove the passwod from the key file, which I don't want to do :))
>
> Just out of curiosity (and maybe learn something) why not? If you have
> the certificate and the password stored together then I'd say the
> password is not protecting much.

I'm not aware of a reason to lock the keyfile ... fairly standard AFAIK.

Though if you wanted to get fancy, you could probably store the pass in the
kernel and use some request-key/keyctl trickery to pull it out when needed
... would need to be loaded at least once on boot, but its the same place
SSH/GPG keeps your keys IIRC, so it's safe ...

... maybe enc the password with your TPM, then decrypt into kernel keyring,
then load into openssl when requested ... :-O

Or just unlock the keyfile.

--

C Anthony


[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux