Please create an account to participate in the Slashdot moderation system


Forgot your password?

Submission + - Secure private key storage for UNIX?

An anonymous reader writes: Microsoft Windows, from 2000 forwards (except ME) offers secure certificate and private storage at the OS level in what is called a protected store. Offline, its encrypted by a combination of the user's password and a session key stored on the filesystem. When the OS is running, the private keys stored are available to the logged in user, optionally encrypted with another password. The keys are stored in protected memory, so no applications can access them without going through the Microsoft CAPI calls. This code also is FIPS 140-1 level 1 (the best one can get for software cryptography modules) compliant.

This functionality (especially certified FIPS 140-1 or FIPS 140-2) would be nice to see in UNIX variants. MacOS's keychain functionality is similar, but stores at the application level, and is not FIPS compliant. An implementation of the protected store functionality will allow applications like Firefox, Thunderbird and gpg to have one common place to obtain private keys and certificates rather than maintaining their own individual keystores. An additional application for this would be the ability to use hardware PKCS #11 tokens.

I am wondering why this functionality does not exist at the OS level in most OSes except Windows. A number of applications on many platforms have this functionality, but its at the app level, with their own keystores, and not a standard at the OS level.

Building translators is good clean fun. -- T. Cheatham