On Fri, Jul 23, 2010 at 14:00, Anders Rundgren
<anders.rundg...@telia.com> wrote:
>> I'm not sure I understand entirely; so the system uses a digital
>> signature, but would you know if it uses secure messaging too?
>
> They do not use SM.  If they did somebody would reverse engineer
> the software and claim "victory" or something like that :-)

Er, right, been there… 0:-)

> SM was probably designed for usage in certified terminals so that the card
> wouldn't do anything interesting except in such a device.

Which is the idea in CWA 14890-1, as far as I can tell, paragraph 8.2:
the card holder decides whether the environment is trusted or not, and
if it is, the path is already trusted, without a need for secure
messaging. The examples of untrusted environments are limited to
signing application and SSCD being in different physical locations, or
biometrics.

>> Do I infer correctly that the system uses secure messaging, but
>> client-side software is limited to relaying encoded APDUs that are
>> generated/decoded by the server-side application?
>
> You mean SKS/KeyGen2?
>
> Yes, the client software is a semi-trusted proxy that does the heavy
> lifting including XML encoding/decoding, networking, and GUI but it is
> still a fully E2ES (End To End Secured) solution with user PIN setting
> as the only exception.  If the proxy does not relay properly the
> system will abort in one of the ends (SKS or issuer).
> It is like Global Platform's SCP80 on steroid's.

I was thinking of the Swedish system, but you answered me by telling
me it doesn't use SM. Besides, I started looking at KeyGen2 yesterday,
so the clarification is welcome :)

Thanks!

-- 
Emanuele
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to