Hi Thomas,

My apologies for such a late answer, I originally did all this in a live
environment, so I had to find the time to rebuild the setup.

On Thu, 11 Aug 2016 11:32:57 +0100 Thomas Habets <tho...@habets.se> wrote:
> Could you provide a config (without secrets) that triggers this?

It seems to be sufficient to set charon to use the module. Attached is
my /etc/strongswan.d/charon/pkcs11.conf file.

For completeness' sake: I've taken the steps described on
https://blog.habets.se/2013/11/TPM-chip-protecting-SSH-keys---properly
up to the config part.

Kind regards,
Willem Mulder
pkcs11 {

    # Whether to load the plugin. Can also be an integer to increase the
    # priority of this plugin.
    load = yes

    # Whether to load certificates from tokens.
    # load_certs = yes

    # Reload certificates from all tokens if charon receives a SIGHUP.
    # reload_certs = no

    # Whether the PKCS#11 modules should be used for DH and ECDH (see use_ecc
    # option).
    # use_dh = no

    # Whether the PKCS#11 modules should be used for ECDH and ECDSA public key
    # operations. ECDSA private keys can be used regardless of this option.
    # use_ecc = no

    # Whether the PKCS#11 modules should be used to hash data.
    # use_hasher = no

    # Whether the PKCS#11 modules should be used for public key operations, even
    # for keys not stored on tokens.
    # use_pubkey = no

    # Whether the PKCS#11 modules should be used as RNG.
    # use_rng = no

    # List of available PKCS#11 modules.
    modules {
        simple-tpm-pk11 {
            path = /usr/lib/x86_64-linux-gnu/libsimple-tpm-pk11.so
        }
    }

}

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to