Hello,

I released the RSA PAM module under the applications section.  It creates a
random nonce and encrypts it with a public key stored in your home
directory and then challenges the card for the decrypted 128 byte nonce.

There is a key injection utility included and the keys are generated from
some ssh libraries.  I have tried it with the Todos and Reflex readers.
Other readers might not be too friendly to the card until you increase it's
WWT in the ATR.

This is the first release.  I have found that it denies access about 1 out
of 5 times which leads me to believe that:

A) The signing on the card doesn't quite work.
B) I have a buffer overflow in the client libraries. - I will be running
memory
   tracing programs this weekend to see if this is the problem.

I will also soon be releasing 'smartcrypt' which will allow you to encrypt
files on your computer using your smartcard.  Basically it will allow you
to choose the file you want and it will create a random 128 byte 3DES key
and then encrypt the file with that.  It will encrypt the 3DES key with the
user's public key and then prepend that to the file.

A valid user will detach the prepended encrypted 3DES key and pass it to
the card to be signed.  If the decrypted key comes back it will be able to
decrypt the file.

I suppose I should note that all this software contains crypto and in the
US we have some crazy laws about those sorts of things so don't do anything
I wouldn't do : )


Best Regards,
Dave

David Corcoran                                  Purdue University
1008 Cherry Lane                                Center for Education
West Lafayette, IN 47906                        and Research in Information
[EMAIL PROTECTED]                          Assurance and Security.
765 - 427 - 5147                                http://www.linuxnet.com


***************************************************************
Linux Smart Card Developers - M.U.S.C.L.E.
(Movement for the Use of Smart Cards in a Linux Environment)
http://www.linuxnet.com/smartcard/index.html
***************************************************************

Reply via email to