Jean-Michel Pouré - GOOZE wrote:
> On Mon, 2010-04-19 at 09:55 +0200, Anders Rundgren wrote:
>> Regarding what is ready and what's not, it is entirely clear that
>> card initialization is NOT READY for mass-market adoption.  

> ?

This may be a no-issue for you and OpenSC but please tell me how you enroll
keys in your iPhone, it essentially the same problem although the iPhone is
not a smart card.

Like this: ?

http://na.blackberry.com/eng/ataglance/security/products/smartcardreader

that's a $200+ clumsy card reader requiring third party software that
typically breaks for each iteration of the mobile OS.


>> OpenSC
>> does currently not support end-to-end security initialization so IMO
>> it is not suitable as is and I also believe that the symmetric key
>> card solutions that you can buy are useless on the Internet. 
> 
> False. On Gooze.eu, I am writing a tutorial explaining how to use
> CAcert.org to manage smart cards, from initialization to revocation.

I wonder if we talking about the same subject.  I'm talking about establishing
a secure channel between the card and the CA so that the CA actually knows
that the key-pair was created in the card.

> I still believe you are working only spec. 

That's *almost* true but the spec. is derived from hands-experiences
with cards as well as standardization efforts gone wrong due to the
tokens vendors focus on preserving "uniqueness" which is sort of
the opposite to "interoperability".

 >If you don't use smartcards,
> you are not going to understand what is currently available.

I use smart cards and they don't work as our customers' expect them to
and I think think they are right :-).  I feel caught in the cross-fire
between "system integrators".  Passwords do not need this lot....

> 
> Kind regards,

Agreed!
Anders
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to