Hi Alon, sorry I missed your response since it got filtered away without me being aware.. Better late than never, I suppose..
On Mon, 2 Jul 2007 21:47:46 +0300 "Alon Bar-Lev" <[EMAIL PROTECTED]> wrote: > On 7/2/07, Bud P. Bruegger <[EMAIL PROTECTED]> wrote: > > Hi Alon, > > > > have you already made progress in the implementation? I was very > > interested in this since I'd like to write some non-traditional pkcs#11 > > module and I'd prefer to do that in python... I was wondering whether > > the forwarding driver could be a good fit for this... > > No, I had no time yet. > But now, after KDE guys deferred smartcard integration in a year, I > probably have some time. Have you had a chance to work on it in the meantime? > > In more detail, instead of using a static, local token, I would like to > > interface the pkcs#11 to a dynamic certificate: the middleware first > > creates a keypair, sends it off to a CA that issues a certificate on > > the fly, and then presents that through the pkcs#11 interface. > > > > Will this kind of thing be possible? > > I don't think so. > There is no valid common sequence that will allow you to do this. > I also don't see the use case, can you please explain? The use is what I call TLS-Federation. Using plain old TLS (or SSL) with client-cert-authentication is kind of my favorite approach since it is simple, works, and is well proven. Europe wants interoperability of eIDs by 2010 and does so while leaving full autonomy to Member States what kind of electronic identities they issue. So while most states issue some X.509-based smartcards, some issue non-X.509 smartcard eIDs, and some even use username password. So Europe seeks a "Federated" solution that works with all these eIDs. Plain TLS works only with X.509 eIDs and is thus not a possible solution--at least without an extension that makes it federated ;-) So TLS-Federation means that for non-X.509 eIDs, a certificate is issued on the fly by an Identity Provider (really a plain old CA) that authenticates with the country specific (mostly proprietory) authentication mechanism and then issues a cert that can be used in the TLS-handshake (with a keypair that is generated by the middleware). If ever possible, I'd like to wip up a proof of concept to demonstrate at Porvoo 12 on October 18/19--and your project seemed to make it possible that I wip up the base functionality in python... This was a very brief description--let me know whether it was too brief to convey any sense.. best cheers -b > > Alon. -- Ing. Bud P. Bruegger, Ph.D. +39-0564-488577 (voice), -21139 (fax) Servizio Elaborazione Dati e-mail: [EMAIL PROTECTED] Comune di Grosseto jabber: [EMAIL PROTECTED] Via Ginori, 43 http://www.comune.grosseto.it/ 58100 Grosseto (Tuscany, Italy) http://www.comune.grosseto.it/interopEID/ _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel