Hello,

On Mar 28, 2010, at 10:53 , Jean-Michel Pouré - GOOZE wrote:
> I searched for a smart card GUI and could not find any. 
Terms such as "smart card GUI" and "smart card application" are really vague, 
especially if you're talking about smart cards with PKI/cryptography in mind.

Firefox and Thunderbird for example provide smart card GUI-s as they are GUI 
applications with PKCS#11 capabilities.
For smart card applications, I would argue that muscle applet and the OSS MRTD 
applet are smart card applications (applications that reside inside a smart 
card).

I guess none of the above matches your idea of a GUI or an application.

> After having a look around, I think that GnoMint
GnoMint is a "CA" software that describes exactly what it does on the first 
line of features list:
"""Creating all the infrastructure to keep and run a Certification Authority, 
saved in only one file."""

The only extension to a CA software would be using PKCS#11 for storing the CA 
signing key on a smart card (or HSM with PKCS#11 module)
GnoMind is not listed on the ApplicationSupport page because it does not 
advertise any kind of PKCS#11 support. It works with files and probably is a 
frontend to OpenSSL. Maybe the author wants to integrate engine_pkcs11 support 
into it.

CA software that *does*  support PKCS#11 does exist in the wiki:
http://www.opensc-project.org/opensc/wiki/ApplicationSupport#PKICA

(I just checked OpenCA source, the OpenSC support is via command line tools not 
via PKCS#11, will investigate)

> and Seahorse could be a good candidates, because they offer basic X.509 
> certificate management
> features. I sent project leaders a Feitian PKI smartcard.
An application similar to Seahorse is the Keychain Access.app on Mac OS X. It 
provides a GUI for the keychain services that is the "high level" interface to 
the CDSA implementation on Mac OS X.
The Linux *-keyring efforts AFAIK deal with storing and managing passwords and 
other "secrets", they do not deal with smart cards as to provide services for 
operating with key references (so that actual operations would happen in the 
card via PKCS#11) but deal with raw key material. 

The situation might have changed, but last time I checked out the relevant 
Linux applications and their infrastructures, it was not possible nor really 
sensible to extend their functionality.

The closest thing to a useful infrastructure project on Linux might be the Qt 
QCA, which has PKCS#11 support thanks to Alon Bar-Lev.

See http://sites.google.com/site/alonbarlev/qca-pkcs11 for more information.

This, of course, is not compatible with the Gnome camp or in other words 
suffers the normal Linux fragmentation problem :)

> Feel free to contact them if you would like to provide some help.

Some time ago there was an effort from the freedesktop.org folks to make a 
"unified cross-desktop authentication subsystem" I tried to follow their e-mail 
list http://lists.freedesktop.org/mailman/listinfo/authentication but there 
seemed to be zero interest in authentication other than password storage. Maybe 
this has changed as well.


-- 
Martin Paljak
http://martin.paljak.pri.ee
+3725156495


_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to