Re: native pkcs#11 and dynamic signing issues

2016-01-24 Thread Arun N S
The issue is fixed. I was using the default named daemon, which is not aware of the native pkcs#11 compiled in. Started named-pkcs11 fixed a couple of permission issues, and it worked. # rndc sign example.com received control channel command 'sign example.com' zone sa/IN (signed): reconfiguring z

Re: native pkcs#11 and dynamic signing issues

2016-01-21 Thread Arun N S
Thanks for the response. My understanding is that, when you use native pkcs#11 it is not dependent on the openssl engine. But yes the bind is chrooted. I tried to run it without chroot and still got the same issue. The private key reference file created by dnsseckey-fromlabel has the Engine define

Re: native pkcs#11 and dynamic signing issues

2016-01-21 Thread Tony Finch
Arun N S wrote: > > but with dynamic signing the logs were showing > "dns_dnssec_findmatchingkeys: error reading key file > Kexample.com.+008+01234.private: no engine" > > any idea? Wild guess (I know nothing about PKCS#11): are you running chrooted, and if so is the relevant OpenSSL engine plug

native pkcs#11 and dynamic signing issues

2016-01-21 Thread Arun N S
Running bind 9.10.3-7.P2, with softhsm-2.0.0rc1-3 on Fedora 23. I was able to sign the zones with dnssec-signzone-pkcs11 command line, # dnssec-signzone-pkcs11 example.com Verifying the zone using the following algorithms: RSASHA2. Zone fully signed: Algorithm: RSASHA2: KSKs: 1 active, 0 stand