Hello,

It is insecure if you use an insecure card with an insecure profile which does 
not require PIN verification (user consent) before every operation.

It does not matter if your card is "secure" and/or the application using the 
PKCS#11 module is built with security and usability in mind (not all of them 
are).

The fact is that turning this on by default will prevent people from using any 
other software with their smart cards, which is is no better.

Security is always a tradeoff between strictness and usability. A system that 
can not be used is not a secure system.

In real life the card capabilities, matching OpenSC card drivers, application 
requirements and application behavior vary a LOT. It is turned off because 
many/most people want to use their card with multiple PKCS#11 applications (for 
example, Thunderbird and Firefox) simultaneously.

While there are improvements to be made in locking behavior of OpenSC PKCS#11 
(for example, locking the card for the duration of API calls that form a 
logical unit) and multi-application access, this configuration option is not a 
black and white, on-off security switch.

A word of warning would nevertheless be a nice thing if it was accompanied with 
some documentation on what are the risks, what they actually matter and what 
could be done about them.

That would require an accurate config file warning (the lock_login feature is 
by default turned OFF, not ENABLED as you have it) and the implications written 
down in wiki. There is a section that deals with it already [1].

The "Paranoid Setup" section should also remind people to perform 
personalization on dedicated, disconnected machine, use a PIN code of at least 
6 digits and not to put their (FIPS/CC certified) card into a reader that does 
not have a certified pinpad firmware.

Best,

[1] http://www.opensc-project.org/opensc/wiki/SecureSetup



On Aug 3, 2010, at 11:05 PM, Andre Zepezauer wrote:

> Dear OpenSC developers,
> 
> in the interests of the users of OpenSC, it would be fair to apply the
> following patch.
> 
> Kind Regards
> Andre Zepezauer
> 
> 
> Index: etc/opensc.conf.in
> ===================================================================
> --- etc/opensc.conf.in        (revision 4620)
> +++ etc/opensc.conf.in        (working copy)
> @@ -347,8 +347,12 @@
>               # Thus the other users or other applications is not prevented
>               # from connecting to the card and perform crypto operations
>               # (which may be possible because you have already authenticated
> -             # with the card). This setting is not very secure.
> +             # with the card).
>               #
> +             # WE (THE OPENSC DEVELOPERS) ARE VERY AWARE OF THE FACT, THAT
> +             # THIS FEATURE IS INSECURE. NEVERTHELESS IT IS ENABLED BY 
> DEFAULT,
> +             # BECAUSE WE DON'T CARE ABOUT YOUR (THE USERS) SECURITY NEEDS.
> +             #
>               # Also, if your card is not locked, you can enconter problems 
>               # due to limitation of the OpenSC framework, that still is not 
>               # thoroughly tested in the multi threads environment.
> 
> 
> _______________________________________________
> opensc-devel mailing list
> opensc-devel@lists.opensc-project.org
> http://www.opensc-project.org/mailman/listinfo/opensc-devel

-- 
Martin Paljak
@martinpaljak.net
+3725156495

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to