You can subscribe to this list here.
2012 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
(1) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2013 |
Jan
(26) |
Feb
(64) |
Mar
(78) |
Apr
(36) |
May
(51) |
Jun
(40) |
Jul
(43) |
Aug
(102) |
Sep
(50) |
Oct
(71) |
Nov
(42) |
Dec
(29) |
2014 |
Jan
(49) |
Feb
(52) |
Mar
(56) |
Apr
(30) |
May
(31) |
Jun
(52) |
Jul
(76) |
Aug
(19) |
Sep
(82) |
Oct
(95) |
Nov
(58) |
Dec
(76) |
2015 |
Jan
(135) |
Feb
(43) |
Mar
(47) |
Apr
(72) |
May
(59) |
Jun
(20) |
Jul
(17) |
Aug
(14) |
Sep
(34) |
Oct
(62) |
Nov
(48) |
Dec
(23) |
2016 |
Jan
(18) |
Feb
(55) |
Mar
(24) |
Apr
(20) |
May
(33) |
Jun
(29) |
Jul
(18) |
Aug
(15) |
Sep
(8) |
Oct
(21) |
Nov
(5) |
Dec
(23) |
2017 |
Jan
(3) |
Feb
|
Mar
(17) |
Apr
(4) |
May
|
Jun
(5) |
Jul
(1) |
Aug
(20) |
Sep
(17) |
Oct
(21) |
Nov
|
Dec
(3) |
2018 |
Jan
(62) |
Feb
(4) |
Mar
(4) |
Apr
(20) |
May
(16) |
Jun
|
Jul
(1) |
Aug
(9) |
Sep
(3) |
Oct
(11) |
Nov
|
Dec
(9) |
2019 |
Jan
(1) |
Feb
(1) |
Mar
(2) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(2) |
Oct
(5) |
Nov
|
Dec
(5) |
2020 |
Jan
(11) |
Feb
(14) |
Mar
(7) |
Apr
|
May
|
Jun
(3) |
Jul
(3) |
Aug
(6) |
Sep
(2) |
Oct
(15) |
Nov
(11) |
Dec
(7) |
2021 |
Jan
(14) |
Feb
(21) |
Mar
(3) |
Apr
(1) |
May
(1) |
Jun
|
Jul
(1) |
Aug
(1) |
Sep
(3) |
Oct
|
Nov
|
Dec
|
2022 |
Jan
|
Feb
(1) |
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
(4) |
Nov
(12) |
Dec
|
2023 |
Jan
(2) |
Feb
(4) |
Mar
|
Apr
(8) |
May
|
Jun
(2) |
Jul
|
Aug
(3) |
Sep
(1) |
Oct
|
Nov
(1) |
Dec
(1) |
2024 |
Jan
|
Feb
(2) |
Mar
(6) |
Apr
(1) |
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
(1) |
Oct
|
Nov
(4) |
Dec
|
2025 |
Jan
(1) |
Feb
|
Mar
|
Apr
(5) |
May
|
Jun
|
Jul
(11) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: NdK <ndk...@gm...> - 2018-01-07 23:22:43
|
Il 07/01/2018 15:22, Anders Rundgren ha scritto: > Smart cards represent "a blast from the past". Should simply be rethought. > Embedded security (assuming Intel & Co succeeds tightening the current > ugly issues..) is the future. I don't think so. A smartcard (or a token) can physically be removed from the system, preventing its use. A chip on the mobo no. Neither can it be carried to another machine and "just work". BYtE, Diego. |
From: NdK <ndk...@gm...> - 2018-01-07 23:17:55
|
Il 07/01/2018 14:53, Frank Morgner ha scritto: > Have you debugged the problem? Quite some time ago. IIRC, both FF and TB use exclusive locking. Moreover (at least FF) asks for *all* the PINs (they say that's for enabling discovery of "hidden" certs... can only be bypassed from command line using "friendly certs" option). BYtE, Diego |
From: Ian H. <we...@us...> - 2018-01-07 22:20:09
|
Thanks, I know that, however with this usb key you can also enable smart card mode (CCID) as well using the Feitian application, which I have done. Similar to the Yubikey 4 and Neo. The output file I attached previously shows that the usb is a valid CCID smart card and Ludovic of libccid has this usb on his 'should work's list. The only issue seems to be that there is not a Opensc driver, perhaps based on an update to the Feitian ePass2003 usb smart card. Note this is totally separate to U2F mode, which I can actually disable if required. On Sun, 7 Jan 2018, 10:11 pm Bernd Eckenfels, <ec...@zu...> wrote: > You cannot store certificates or keys on a U2F only device, it only > supports the U2F features for key derivation. > > Gruss > Bernd > -- > http://bernd.eckenfels.net > ------------------------------ > *From:* Ian Hill <we...@us...> > *Sent:* Sunday, January 7, 2018 10:27:39 PM > *To:* Frank Morgner > *Cc:* Bernd Eckenfels; ope...@li... > *Subject:* Re: [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) > > > Thanks, this usb supports both U2F and CCID, the U2F works as expected, > however, having enabled the CCID mode although it is recognised as a CCID > card under libccid there is no suitable driver in Opensc. > > If anyone can help with the driver I can test it this end. > > On Sun, 7 Jan 2018, 1:58 pm Frank Morgner, <fra...@gm...> wrote: > >> U2F is yet an other token standard. So, by design, it is not to be used >> with the APIs that OpenSC is offering. However, that should not be a >> problem, because U2F capable applications should have native support for >> your token without the need of OpenSC. >> >> >> In theory we could add low level support for U2F and even some PKCS#11 >> wrapping for U2F into OpenSC. But currently there are no applications that >> have use for this. >> >> 2018-01-06 22:20 GMT+01:00 Ian Hill <we...@us...>: >> >>> Yep, it's the U2F version and that works fine, however, I would like to >>> add gpg keys to it and have enabled U2F & CCID mode. >>> >>> It is now recognised by libccid using the latest stable version but not >>> recognised by Opensc. >>> >>> I assume if I can get Opensc working I should be able to add either gpg >>> or RSA keys to the smart card. >>> >>> On Sat, 6 Jan 2018, 7:57 pm Bernd Eckenfels, <ec...@zu...> >>> wrote: >>> >>>> Sounds like Fido Universal Two Factor. Chrome should be able to use >>>> that as a login token. (There is for example a Yubikey U2F Token which >>>> works great with Chrome) >>>> >>>> Gruss >>>> Bernd >>>> -- >>>> http://bernd.eckenfels.net >>>> ------------------------------ >>>> *From:* Ian Hill <we...@us...> >>>> *Sent:* Saturday, January 6, 2018 6:57:03 PM >>>> *To:* ope...@li... >>>> *Subject:* [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) >>>> >>>> Hi >>>> >>>> I have the following card which I have managed to find with libccid, >>>> however, it is not supported by OpenSC. >>>> >>>> $ opensc-tool --atr >>>> Using reader with a card: FT U2F CCID [CCID] 00 00 >>>> 3b:f9:13:00:00:81:31:fe:45:4a:43:4f:50:32:34:32:52:33:a2 >>>> >>>> >>>> Is there a driver in the works, or can I help with any information? >>>> >>>> >>>> Ian >>>> >>>> >>>> >>>> >>>> >>> >>> ------------------------------------------------------------------------------ >>> Check out the vibrant tech community on one of the world's most >>> engaging tech sites, Slashdot.org! http://sdm.link/slashdot >>> _______________________________________________ >>> Opensc-devel mailing list >>> Ope...@li... >>> https://lists.sourceforge.net/lists/listinfo/opensc-devel >>> >>> >> > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel > |
From: Bernd E. <ec...@zu...> - 2018-01-07 22:10:38
|
You cannot store certificates or keys on a U2F only device, it only supports the U2F features for key derivation. Gruss Bernd -- http://bernd.eckenfels.net ________________________________ From: Ian Hill <we...@us...> Sent: Sunday, January 7, 2018 10:27:39 PM To: Frank Morgner Cc: Bernd Eckenfels; ope...@li... Subject: Re: [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) Thanks, this usb supports both U2F and CCID, the U2F works as expected, however, having enabled the CCID mode although it is recognised as a CCID card under libccid there is no suitable driver in Opensc. If anyone can help with the driver I can test it this end. On Sun, 7 Jan 2018, 1:58 pm Frank Morgner, <fra...@gm...<mailto:fra...@gm...>> wrote: U2F is yet an other token standard. So, by design, it is not to be used with the APIs that OpenSC is offering. However, that should not be a problem, because U2F capable applications should have native support for your token without the need of OpenSC. In theory we could add low level support for U2F and even some PKCS#11 wrapping for U2F into OpenSC. But currently there are no applications that have use for this. 2018-01-06 22:20 GMT+01:00 Ian Hill <we...@us...<mailto:we...@us...>>: Yep, it's the U2F version and that works fine, however, I would like to add gpg keys to it and have enabled U2F & CCID mode. It is now recognised by libccid using the latest stable version but not recognised by Opensc. I assume if I can get Opensc working I should be able to add either gpg or RSA keys to the smart card. On Sat, 6 Jan 2018, 7:57 pm Bernd Eckenfels, <ec...@zu...<mailto:ec...@zu...>> wrote: Sounds like Fido Universal Two Factor. Chrome should be able to use that as a login token. (There is for example a Yubikey U2F Token which works great with Chrome) Gruss Bernd -- http://bernd.eckenfels.net ________________________________ From: Ian Hill <we...@us...<mailto:we...@us...>> Sent: Saturday, January 6, 2018 6:57:03 PM To: ope...@li...<mailto:ope...@li...> Subject: [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) Hi I have the following card which I have managed to find with libccid, however, it is not supported by OpenSC. $ opensc-tool --atr Using reader with a card: FT U2F CCID [CCID] 00 00 3b:f9:13:00:00:81:31:fe:45:4a:43:4f:50:32:34:32:52:33:a2 Is there a driver in the works, or can I help with any information? Ian ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Opensc-devel mailing list Ope...@li...<mailto:Ope...@li...> https://lists.sourceforge.net/lists/listinfo/opensc-devel |
From: Ian H. <we...@us...> - 2018-01-07 21:52:56
|
Thanks, this usb supports both U2F and CCID, the U2F works as expected, however, having enabled the CCID mode although it is recognised as a CCID card under libccid there is no suitable driver in Opensc. If anyone can help with the driver I can test it this end. On Sun, 7 Jan 2018, 1:58 pm Frank Morgner, <fra...@gm...> wrote: > U2F is yet an other token standard. So, by design, it is not to be used > with the APIs that OpenSC is offering. However, that should not be a > problem, because U2F capable applications should have native support for > your token without the need of OpenSC. > > > In theory we could add low level support for U2F and even some PKCS#11 > wrapping for U2F into OpenSC. But currently there are no applications that > have use for this. > > 2018-01-06 22:20 GMT+01:00 Ian Hill <we...@us...>: > >> Yep, it's the U2F version and that works fine, however, I would like to >> add gpg keys to it and have enabled U2F & CCID mode. >> >> It is now recognised by libccid using the latest stable version but not >> recognised by Opensc. >> >> I assume if I can get Opensc working I should be able to add either gpg >> or RSA keys to the smart card. >> >> On Sat, 6 Jan 2018, 7:57 pm Bernd Eckenfels, <ec...@zu...> >> wrote: >> >>> Sounds like Fido Universal Two Factor. Chrome should be able to use that >>> as a login token. (There is for example a Yubikey U2F Token which works >>> great with Chrome) >>> >>> Gruss >>> Bernd >>> -- >>> http://bernd.eckenfels.net >>> ------------------------------ >>> *From:* Ian Hill <we...@us...> >>> *Sent:* Saturday, January 6, 2018 6:57:03 PM >>> *To:* ope...@li... >>> *Subject:* [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) >>> >>> Hi >>> >>> I have the following card which I have managed to find with libccid, >>> however, it is not supported by OpenSC. >>> >>> $ opensc-tool --atr >>> Using reader with a card: FT U2F CCID [CCID] 00 00 >>> 3b:f9:13:00:00:81:31:fe:45:4a:43:4f:50:32:34:32:52:33:a2 >>> >>> >>> Is there a driver in the works, or can I help with any information? >>> >>> >>> Ian >>> >>> >>> >>> >>> >> >> ------------------------------------------------------------------------------ >> Check out the vibrant tech community on one of the world's most >> engaging tech sites, Slashdot.org! http://sdm.link/slashdot >> _______________________________________________ >> Opensc-devel mailing list >> Ope...@li... >> https://lists.sourceforge.net/lists/listinfo/opensc-devel >> >> > |
From: Anders R. <and...@gm...> - 2018-01-07 14:22:59
|
Smart cards represent "a blast from the past". Embedded security (assuming Intel & Co succeeds tightening the current ugly issues..) is the future. |
From: Douglas E E. <dee...@gm...> - 2018-01-07 14:14:37
|
Sorry your are disappointed in the state of smart card these days. It is what it is for a number of historical reasons. o Multiple vendors providing cards middleware and applications to use only their cards. o Difference of opinions on how cards should be used. o Developers are concerned with their cards and not others. o Standards are overly complicated and most things are optional leading to no common standards. o OS vendors never really adopted smart cards. The market was way to small. o and the list goes on. Note that much of the middleware including pkcs11 runs in the user applications not in the OS. So caching is done by each application as long as it keeps pkcs11 active. So every ssh use if a key requires pkcs11 to be loaded the card connected, certificates be read etc. But long running applications can lock out access to a card from other applications. Some call this a security requirement. Others would call this a bug. There are some things you can do. For some cards, OpenSC can cache certificates and other data in in the user's home directory. OpenSC can try and leave the card in a logged instate if you set the disconnect = leave see the comments in opensc.conf. But other applications not using OpenSC can still lock the access to the card at the PCSC level. On 1/7/2018 4:53 AM, NdK wrote: > Il 07/01/2018 00:17, J.W...@mi... ha scritto: > >> You know there is a patch for OpenSSH, so it can use ssl keys/certificates.... >> Afaicr this feature is for years in the commercial branch of ssh. > Uh? I've been able to use a simple PKCS11Provider config option to > specify the lib to use and access keys on card. > But the point is that if Firefox is accessing the same card, ssh fails. > > BYtE, > Diego > > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel > -- Douglas E. Engert <DEE...@gm...> |
From: Frank M. <fra...@gm...> - 2018-01-07 13:58:33
|
U2F is yet an other token standard. So, by design, it is not to be used with the APIs that OpenSC is offering. However, that should not be a problem, because U2F capable applications should have native support for your token without the need of OpenSC. In theory we could add low level support for U2F and even some PKCS#11 wrapping for U2F into OpenSC. But currently there are no applications that have use for this. 2018-01-06 22:20 GMT+01:00 Ian Hill <we...@us...>: > Yep, it's the U2F version and that works fine, however, I would like to > add gpg keys to it and have enabled U2F & CCID mode. > > It is now recognised by libccid using the latest stable version but not > recognised by Opensc. > > I assume if I can get Opensc working I should be able to add either gpg or > RSA keys to the smart card. > > On Sat, 6 Jan 2018, 7:57 pm Bernd Eckenfels, <ec...@zu...> > wrote: > >> Sounds like Fido Universal Two Factor. Chrome should be able to use that >> as a login token. (There is for example a Yubikey U2F Token which works >> great with Chrome) >> >> Gruss >> Bernd >> -- >> http://bernd.eckenfels.net >> ------------------------------ >> *From:* Ian Hill <we...@us...> >> *Sent:* Saturday, January 6, 2018 6:57:03 PM >> *To:* ope...@li... >> *Subject:* [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) >> >> Hi >> >> I have the following card which I have managed to find with libccid, >> however, it is not supported by OpenSC. >> >> $ opensc-tool --atr >> Using reader with a card: FT U2F CCID [CCID] 00 00 >> 3b:f9:13:00:00:81:31:fe:45:4a:43:4f:50:32:34:32:52:33:a2 >> >> >> Is there a driver in the works, or can I help with any information? >> >> >> Ian >> >> >> >> >> > ------------------------------------------------------------ > ------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel > > |
From: Frank M. <fra...@gm...> - 2018-01-07 13:53:25
|
Have you debugged the problem? On 07.01.2018 11:53, NdK wrote: > Il 07/01/2018 00:17, J.W...@mi... ha scritto: > >> You know there is a patch for OpenSSH, so it can use ssl keys/certificates.... >> Afaicr this feature is for years in the commercial branch of ssh. > Uh? I've been able to use a simple PKCS11Provider config option to > specify the lib to use and access keys on card. > But the point is that if Firefox is accessing the same card, ssh fails. > > BYtE, > Diego > > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel |
From: NdK <ndk...@gm...> - 2018-01-07 10:53:53
|
Il 07/01/2018 00:17, J.W...@mi... ha scritto: > You know there is a patch for OpenSSH, so it can use ssl keys/certificates.... > Afaicr this feature is for years in the commercial branch of ssh. Uh? I've been able to use a simple PKCS11Provider config option to specify the lib to use and access keys on card. But the point is that if Firefox is accessing the same card, ssh fails. BYtE, Diego |
From: <J.W...@mi...> - 2018-01-06 23:18:01
|
You know there is a patch for OpenSSH, so it can use ssl keys/certificates.... Afaicr this feature is for years in the commercial branch of ssh. Sent from my iPhone > On 5 Jan 2018, at 17:59, NdK <ndk...@gm...> wrote: > > Il 05/01/2018 16:23, Jakub Jelen ha scritto: > >> this year I am going to FOSDEM and I will have a talk about Smart >> Cards, OpenSC and friends [1]. If you want to hear it, meet me in >> person or discuss something, let me know. > Will you highlight the problems smartcards create, too? > > I'd really like to have "all" my keys on smartcard: > - website authentication > - mail signing/decryption > - ssh auth > -... > > Too bad that if I'm using the smartcard from Firefox I can neither > access it from SSH nor sign/decrypt a mail! > Soo it's still "one card-one key" (mostly). That's, IMVHO, one of the > factors that prevent wider adoption. > > BYtE, > Diego > > > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel > Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband houdt met risico's verbonden aan het elektronisch verzenden van berichten. This message may contain information that is not intended for you. If you are not the addressee or if this message was sent to you by mistake, you are requested to inform the sender and delete the message. The State accepts no liability for damage of any kind resulting from the risks inherent in the electronic transmission of messages. |
From: Ian H. <we...@us...> - 2018-01-06 21:20:37
|
Yep, it's the U2F version and that works fine, however, I would like to add gpg keys to it and have enabled U2F & CCID mode. It is now recognised by libccid using the latest stable version but not recognised by Opensc. I assume if I can get Opensc working I should be able to add either gpg or RSA keys to the smart card. On Sat, 6 Jan 2018, 7:57 pm Bernd Eckenfels, <ec...@zu...> wrote: > Sounds like Fido Universal Two Factor. Chrome should be able to use that > as a login token. (There is for example a Yubikey U2F Token which works > great with Chrome) > > Gruss > Bernd > -- > http://bernd.eckenfels.net > ------------------------------ > *From:* Ian Hill <we...@us...> > *Sent:* Saturday, January 6, 2018 6:57:03 PM > *To:* ope...@li... > *Subject:* [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) > > Hi > > I have the following card which I have managed to find with libccid, > however, it is not supported by OpenSC. > > $ opensc-tool --atr > Using reader with a card: FT U2F CCID [CCID] 00 00 > 3b:f9:13:00:00:81:31:fe:45:4a:43:4f:50:32:34:32:52:33:a2 > > > Is there a driver in the works, or can I help with any information? > > > Ian > > > > > |
From: NdK <ndk...@gm...> - 2018-01-06 21:14:25
|
Il 06/01/2018 17:43, Douglas E Engert ha scritto: > Yes that looks like it is trying to address some of these problem. But > as it > is trying to use some of the middleware that wants exclusive access to a > token at PCSC level, (Gnu OpenPGP) it still has problems. Yup. I got it wrong at the first read. :-) What I couldn't understand is if it allows for more than the 3 keys OpenPGP uses... > I do not have a myEID card, so it is not clear if using the multiple > certs and key and using GPG keys is the same problem with myltiple applets > on the card. It does not have a separate applet for OpenPGP, so OpenPGP should see just a "keys container". >> Guess what's the "normal user" reaction? "fsck smartcards". > I know. That is a problem. Most applets are developed by developers only > interested in their applet. But users are more interested in using a single > token that can be used from multiple applications. Yup. IMVHO the card should be just a "keys container and access conditions enforcer": to perform crypto ops with a key you have to supply a certain PIN. The rest should not pertain to the card but only to the middleware. > Cards are slow, and designed to be cheap and fit in a wallet. Some tokens > are much faster, and you may want to look at a faster device. > The way the card is accessed, each ssh command may have to read a lot > of data off the slow card, before doing any operation. Why? In my ignorance I'd assume the "driver" caches the card data so it can be provided quickly to the clients. Then, if my 42 ssh sessions ask for a signature each and every "transaction" with the card takes 1 second, I'll have all the sessions open in ~42 seconds. That's acceptable. What's not acceptable is that every client have to read all the objects on-card, select the one it's interested in and do the crypto op. > That is the way things developed. The PKCS* and ISO standards date from > the late nineties for use with smart "cards" that were slow and relatively > cheep. Cards continue to be slow & "cheap"... Too bad both computers and users changed a lot in 20 years. Not to mention network pervasivity: 20 years ago it would have been unimmaginable to verify online every transaction (actually that's one of the reasons the "students card" project failed in my university: even the intranet was not sufficiently pervasive...). > Loot at some hsm token if you want speed. It's not only a matter of speed. It's a matter of convenience. 20 years ago a person carried 2-3 "cards". Now it's normal to have at least 7-8, plus fidelity cards. But noone is really interested in having the user use just one card for everything (identity document, driver's license, multiple credit cards, access card, etc). Every "entity" wants the user to have a card with entity's name on it. User's convenience is not on the priority list. I'll just throw an idea -- feel free to flame me. Why couldn't OpenSC (or another program) act as a "proxy", mediating access to card for the different clients, keeping a context for each (possibly emulating "secure channel", but SO_PEERCRED or SCM_CREDENTIALS could be enough: if the machine is compromised, it's game over anyway). This way it could cache the certs and the key IDs, keep separate contexts for different programs, avoid exclusive locks, etc. Uhm... actually it could even be a token between the PC and the card reader (a board that can act both as USB device and USB host on different ports at the same time)... BYtE, Diego |
From: Bernd E. <ec...@zu...> - 2018-01-06 20:28:17
|
Sounds like Fido Universal Two Factor. Chrome should be able to use that as a login token. (There is for example a Yubikey U2F Token which works great with Chrome) Gruss Bernd -- http://bernd.eckenfels.net ________________________________ From: Ian Hill <we...@us...> Sent: Saturday, January 6, 2018 6:57:03 PM To: ope...@li... Subject: [Opensc-devel] Feitian U2F NFC + CCID (FT U2F CCID) Hi I have the following card which I have managed to find with libccid, however, it is not supported by OpenSC. $ opensc-tool --atr Using reader with a card: FT U2F CCID [CCID] 00 00 3b:f9:13:00:00:81:31:fe:45:4a:43:4f:50:32:34:32:52:33:a2 Is there a driver in the works, or can I help with any information? Ian |
From: Ian H. <we...@us...> - 2018-01-06 18:23:33
|
Hi I have the following card which I have managed to find with libccid, however, it is not supported by OpenSC. $ opensc-tool --atr Using reader with a card: FT U2F CCID [CCID] 00 00 3b:f9:13:00:00:81:31:fe:45:4a:43:4f:50:32:34:32:52:33:a2 Is there a driver in the works, or can I help with any information? Ian |
From: Douglas E E. <dee...@gm...> - 2018-01-06 17:09:16
|
On 1/6/2018 5:22 AM, NdK wrote: > Il 05/01/2018 19:17, Douglas E Engert ha scritto: > >> What card and what application/middleware are you using? > The most versatile card I have is the Aventra MyEID (that IIRC can store > up to 15 keys and 15 PINs). That's single-applet, so there shouldn't be > multi-applet-related problems. > OpenSC as middleware (IIUC). FF, TB, SSH and GPG as "clients". I do not have a myEID but When you say clients: FF, TB, SSH they all use PKCS#11 and if you use the OpenSC PKCS#11 for each and set disconnect = leave should help these work together. (See note below.) But if by GPG "client" you mean Gnu scdaemon that may request exclusive access via PCSC and thus lockout other applications. Google for: scdaemon exclusive to see some discussions on this including: https://github.com/OpenSC/OpenSC/issues/953 Note: that PCSC standards do define access by user, but this does not appear to be implemented. Thus a smart card used on one system may be accessible via processes of different users. Thus disconnect = reset and exclusive provide some protection against this as each process must provide the PIN to access the card. So disconnect = leave should be used only on a single user systems. > > BYtE, > Diego > > -- Douglas E. Engert <DEE...@gm...> |
From: Douglas E E. <dee...@gm...> - 2018-01-06 16:43:32
|
On 1/6/2018 5:11 AM, NdK wrote: > Il 05/01/2018 19:01, Bernd Eckenfels ha scritto: >> Hello, >> Did you try scdaemon (scenario 1 with SCd-PKCS11 should work with Firefox) >> https://github.com/sektioneins/scd-pkcs11/blob/master/README.md > IIUC that's for GPG to use OpenSC-managed cards. Yes that looks like it is trying to address some of these problem. But as it is trying to use some of the middleware that wants exclusive access to a token at PCSC level, (Gnu OpenPGP) it still has problems. > > Practical example. I have a MyEID cards where I load a couple of keys > for web auth (say work portal and CAcert), a key for mail signing > (X509), a key for SSH access and the 3 GPG keys (DEC, SIG, AUT, and > possibly the master C key too). > That's what I could do before problems started (I last tested quite some > time ago, so it might a bit fuzzy). IIRC, if I had Firefox open I > couldn't access any key from other apps (including Thunderbird). > If I closed FF, then I could sign/decrypt mails in Thunderbird, but > either with X509 or GPG (Enigmail). And to use SSH I had to close TB, too. I do not have a myEID card, so it is not clear if using the multiple certs and key and using GPG keys is the same problem with myltiple applets on the card. > > Guess what's the "normal user" reaction? "fsck smartcards". I know. That is a problem. Most applets are developed by developers only interested in their applet. But users are more interested in using a single token that can be used from multiple applications. > > Then an unrelated problem (that probably can't be fixed w/o changing a > lot of things): CSSH. CSSH opens ssh sessions to a "cluster" of machines > (I used it with 42 parallel sessions) and allows to send the same > commands to all the sessions. But if the ssh key is on card (and noone > else is using it), it's simply too slow to handle such a batch of > requests and logins timeout. Cards are slow, and designed to be cheap and fit in a wallet. Some tokens are much faster, and you may want to look at a faster device. The way the card is accessed, each ssh command may have to read a lot of data off the slow card, before doing any operation. If every application upon closing, resets the card, the next time the card is used will require more time to open. Consider trying opensc.conf disconnect = leave; rather than reset. Can make a big difference if all applications trying to use the card do the same thing. > > IMVHO PKCS#11 greatly suffered "design by committee", making it hard to > use it correctly in a multi-app scenario. Smartcards made it even worse, > being able to host multiple applets but with only one active at a time: > the very concept "only one program can access the card at any time". > That actually "forces" developers to ask for exclusive access and the > loop closes. That is the way things developed. The PKCS* and ISO standards date from the late nineties for use with smart "cards" that were slow and relatively cheep. Loot at some hsm token if you want speed. > > That's why I have some cards lying around (MyEID, Epass2003, GnuK, a > couple of JCOP card models for programming experiments) but don't use 'em. > > BYtE, > Diego > > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel > -- Douglas E. Engert <DEE...@gm...> |
From: Ludovic R. <lud...@gm...> - 2018-01-06 16:20:58
|
Hello, 2018-01-06 12:11 GMT+01:00 NdK <ndk...@gm...>: > IMVHO PKCS#11 greatly suffered "design by committee", making it hard to > use it correctly in a multi-app scenario. A PKCS#11 application do not have to take care of other applications. The complexity to support multi applications is in the PKCS#11 library, not the application(s). Smartcards made it even worse, > being able to host multiple applets but with only one active at a time: > the very concept "only one program can access the card at any time". > That actually "forces" developers to ask for exclusive access and the > loop closes. > Many programs can access the same smart card at the "same" time. But each of them should take care that they are not alone using the card. The easy solution is to get an exclusive access. That is not the only possible solution. I am not sure what is the (default) behaviour of OpenSC here. I do not want to start a flame war so I will stop here. Bye -- Dr. Ludovic Rousseau |
From: NdK <ndk...@gm...> - 2018-01-06 11:23:03
|
Il 05/01/2018 19:17, Douglas E Engert ha scritto: > What card and what application/middleware are you using? The most versatile card I have is the Aventra MyEID (that IIRC can store up to 15 keys and 15 PINs). That's single-applet, so there shouldn't be multi-applet-related problems. OpenSC as middleware (IIUC). FF, TB, SSH and GPG as "clients". BYtE, Diego |
From: NdK <ndk...@gm...> - 2018-01-06 11:12:01
|
Il 05/01/2018 19:01, Bernd Eckenfels ha scritto: > Hello, > Did you try scdaemon (scenario 1 with SCd-PKCS11 should work with Firefox) > https://github.com/sektioneins/scd-pkcs11/blob/master/README.md IIUC that's for GPG to use OpenSC-managed cards. Practical example. I have a MyEID cards where I load a couple of keys for web auth (say work portal and CAcert), a key for mail signing (X509), a key for SSH access and the 3 GPG keys (DEC, SIG, AUT, and possibly the master C key too). That's what I could do before problems started (I last tested quite some time ago, so it might a bit fuzzy). IIRC, if I had Firefox open I couldn't access any key from other apps (including Thunderbird). If I closed FF, then I could sign/decrypt mails in Thunderbird, but either with X509 or GPG (Enigmail). And to use SSH I had to close TB, too. Guess what's the "normal user" reaction? "fsck smartcards". Then an unrelated problem (that probably can't be fixed w/o changing a lot of things): CSSH. CSSH opens ssh sessions to a "cluster" of machines (I used it with 42 parallel sessions) and allows to send the same commands to all the sessions. But if the ssh key is on card (and noone else is using it), it's simply too slow to handle such a batch of requests and logins timeout. IMVHO PKCS#11 greatly suffered "design by committee", making it hard to use it correctly in a multi-app scenario. Smartcards made it even worse, being able to host multiple applets but with only one active at a time: the very concept "only one program can access the card at any time". That actually "forces" developers to ask for exclusive access and the loop closes. That's why I have some cards lying around (MyEID, Epass2003, GnuK, a couple of JCOP card models for programming experiments) but don't use 'em. BYtE, Diego |
From: Bernd E. <ec...@zu...> - 2018-01-05 18:25:41
|
Hello, Did you try scdaemon (scenario 1 with SCd-PKCS11 should work with Firefox) https://github.com/sektioneins/scd-pkcs11/blob/master/README.md Gruss Bernd -- http://bernd.eckenfels.net ________________________________ From: NdK <ndk...@gm...> Sent: Friday, January 5, 2018 5:58:52 PM To: ope...@li... Subject: Re: [Opensc-devel] OpenSC at FOSDEM 2018 Il 05/01/2018 16:23, Jakub Jelen ha scritto: > this year I am going to FOSDEM and I will have a talk about Smart > Cards, OpenSC and friends [1]. If you want to hear it, meet me in > person or discuss something, let me know. Will you highlight the problems smartcards create, too? I'd really like to have "all" my keys on smartcard: - website authentication - mail signing/decryption - ssh auth -... Too bad that if I'm using the smartcard from Firefox I can neither access it from SSH nor sign/decrypt a mail! Soo it's still "one card-one key" (mostly). That's, IMVHO, one of the factors that prevent wider adoption. BYtE, Diego ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Opensc-devel mailing list Ope...@li... https://lists.sourceforge.net/lists/listinfo/opensc-devel |
From: Douglas E E. <dee...@gm...> - 2018-01-05 18:17:20
|
I addition to Ludovic's comments... It also depends on the middleware that is trying to use the card. Some middleware like the Gnu OpenPGP wants exclusive access to the card thus locking out other user applications. With multiple applications on the same card, like Yubikey with PIV and OpenPGP applications only one application can be active (only one AID selected) at a time on the card. Switching between them can cause the login state to be dropped. Some middleware can not recover from some other middleware selecting an AID on the card and and are not smart enough to reselect their AID. Some cards are not smart enough to ignore an attempt to select an AID that is not on the card and loose the login state for the currently selected application. And lastly Some middleware may reset or power off the card while other middleware is still using it. When smart cards where first introduced, each card had an ATR and a single vendor application and vendor middleware. i.e. No interference between middleware cards each responded to only onle card with the single AID. Today its the application on the card that is important, and a card may have more then one application and an application may be available on many different cards. Thus the ATR can not be used to select the application in some cases. And there are multiple version of middleware to support the multiple applications. For example PIV is supported on more then a dozed approved cards and a few non-approved cards. OpenPGP is available on multiple cards. And Yubikey can have both a PIV and OpenPGP application on the same card. And did I mention Java middleware and non-PKCS#11 middleware? If you have control over all the middleware that might try and access a card,you might be able to get them to work together. For example if it is all opensc based in opensc.conf use disconnect = leave rather than reset. What card and what application/middleware are you using? Jakub, Sounds like a good talk as FOSDEM. Sorry I can not be there. These problems outlined above would be a good follow up talk of BOF. On 1/5/2018 10:58 AM, NdK wrote: > Il 05/01/2018 16:23, Jelen ha scritto: > >> this year I am going to FOSDEM and I will have a talk about Smart >> Cards, OpenSC and friends [1]. If you want to hear it, meet me in >> person or discuss something, let me know. > Will you highlight the problems smartcards create, too? > > I'd really like to have "all" my keys on smartcard: > - website authentication > - mail signing/decryption > - ssh auth > -... > > Too bad that if I'm using the smartcard from Firefox I can neither > access it from SSH nor sign/decrypt a mail! > Soo it's still "one card-one key" (mostly). That's, IMVHO, one of the > factors that prevent wider adoption. > > BYtE, > Diego > > > ------------------------------------------------------------------------------ > Check out the vibrant tech community on one of the world's most > engaging tech sites, Slashdot.org! http://sdm.link/slashdot > _______________________________________________ > Opensc-devel mailing list > Ope...@li... > https://lists.sourceforge.net/lists/listinfo/opensc-devel > . > -- Douglas E. Engert <DEE...@gm...> |
From: NdK <ndk...@gm...> - 2018-01-05 17:39:54
|
Il 05/01/2018 18:15, Ludovic Rousseau ha scritto: > If your PKCS#11 library is correctly designed then you can use your > smart card at the same time in all your applications. > Your problem is not with the smart card itself. > What PKCS#11 library are you using? Plain OpenSC in Linux. No extra drivers, if that's what you mean. Tested with Aventra MyEID cards. But Epass2003 does the same (and it does have other problems, too... "onepin"...). I know that Firefox is an uncooperative beast (still no easy way to enable "friendly" mode to avoid asking all the PINs after many years with an open ticket), but that's just part of the problem. Call it a symptom: every program works thinking it's the only one using the token. BYtE, Diego |
From: Ludovic R. <lud...@gm...> - 2018-01-05 17:16:10
|
Hello, 2018-01-05 17:58 GMT+01:00 NdK <ndk...@gm...>: > Il 05/01/2018 16:23, Jakub Jelen ha scritto: > > > this year I am going to FOSDEM and I will have a talk about Smart > > Cards, OpenSC and friends [1]. If you want to hear it, meet me in > > person or discuss something, let me know. > Will you highlight the problems smartcards create, too? > > I'd really like to have "all" my keys on smartcard: > - website authentication > - mail signing/decryption > - ssh auth > -... > > Too bad that if I'm using the smartcard from Firefox I can neither > access it from SSH nor sign/decrypt a mail! > Soo it's still "one card-one key" (mostly). That's, IMVHO, one of the > factors that prevent wider adoption. > If your PKCS#11 library is correctly designed then you can use your smart card at the same time in all your applications. Your problem is not with the smart card itself. What PKCS#11 library are you using? Bye -- Dr. Ludovic Rousseau |
From: NdK <ndk...@gm...> - 2018-01-05 16:59:02
|
Il 05/01/2018 16:23, Jakub Jelen ha scritto: > this year I am going to FOSDEM and I will have a talk about Smart > Cards, OpenSC and friends [1]. If you want to hear it, meet me in > person or discuss something, let me know. Will you highlight the problems smartcards create, too? I'd really like to have "all" my keys on smartcard: - website authentication - mail signing/decryption - ssh auth -... Too bad that if I'm using the smartcard from Firefox I can neither access it from SSH nor sign/decrypt a mail! Soo it's still "one card-one key" (mostly). That's, IMVHO, one of the factors that prevent wider adoption. BYtE, Diego |