1
1
TLSPOOL README
2
2
==============
3
3
4
- The tlspool package concentrates TLS-use by client and server applications.
4
+ The tlspool package concentrates TLS usage by client and server applications.
5
5
It gets passed a file descriptor of a socket, initiates TLS over it, and
6
6
then makes a callback with authenticated local/remote identities in a
7
7
request for an additional file descriptor for the plaintext side. This
@@ -46,7 +46,7 @@ The core logic used here is (client shown, server is similar):
46
46
close (plainfd);
47
47
plainfd = -1;
48
48
}
49
- ...error reoprting ...
49
+ ...error reporting ...
50
50
} else {
51
51
...continue to use plainfd...
52
52
}
@@ -65,8 +65,8 @@ in the tlsparams structure after this call.
65
65
The importance of PKCS #11
66
66
--------------------------
67
67
68
- The key material used by this daemon will be accessed over PKCS #11. This
69
- requires multi-layered attacks to key material: the material is protected
68
+ The key material used by this daemon will be accessed over PKCS #11. Compromise
69
+ will require multi-layered attacks to key material: the material is protected
70
70
by a secure key store of choice, in hardware or software, and even the PIN
71
71
for using the private keys without seeing them is stored in a separate
72
72
program, namely the TLS Pool. Specifically, the PIN and key material are
@@ -94,7 +94,7 @@ for usable keys to authenticate its identities to the Internet, both over
94
94
X.509 and over OpenPGP.
95
95
96
96
One final, and hardly recognised use of having a central TLS Pool and
97
- potentially centralised PKCS #11 repositories is the ability to sniff
97
+ potentially centralised PKCS #11 repositories is the ability to monitor
98
98
the network traffic for intrusion attempts. To be able to do this in
99
99
the presence of encrypted connections, the ability to decrypt the
100
100
traffic must be offered to sniffers like Snort. The decryption usually
0 commit comments