Re: [opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Douglas E. Engert


On 8/22/2012 1:53 PM, Andreas Schwier wrote:
> Yes, that's basically what our patch is all about. There are actually
> two places in minidriver.c where the tokeninfo->serial_number value is
> copied. We propose to change both as you can see in [1].

Looks good.

>
> Andreas
>
> [1]
> https://github.com/CardContact/OpenSC/commit/724cdd06e23ecd2e822bd1f138d9c3fbdafe9324
>
> Am 22.08.2012 20:30, schrieb Douglas E. Engert:
>>
>> On 8/22/2012 11:24 AM, Andreas Schwier (ML) wrote:
>>> Hi Douglas,
>>>
>>> see below.
>>>
>>> Am 22.08.2012 18:00, schrieb Douglas E. Engert:
 On 8/22/2012 10:09 AM, Andreas Schwier wrote:
> Hi Douglas,
>
> thanks for your infos.
>
> The minidriver.c already ensures that the cardid file is always 16 byte.
> It does this by repeating the token serial number until 16 bytes are 
> filled.
 Unfortunately that gives OpenbSC 16 bytes but does not improve the 
 uniqunness.

 Fortunately the uniqueness today only needs to extend over all the cards
 as seen on a single machine which may be only a hand full. the cardid
 is not sent to AD for example.  But it also means that if the certificates
 or keys on a card are changed, the cardid should also change.

> We can ensure uniqueness of the serial number for our cards, but no
> uniqueness among all other card vendors. There remains a (very) little
> probability that a hexadecimal encoded serial number of another vendor's
> card resembles one of our ASCII serial numbers.
>
> Our serial numbers are based on the numbering scheme for machine
> readable travel documents, a 2 digit country code followed by up to 9
> ASCII digits (e.g. UTTM1234567 equals 5554544D313233343536375554544D31
> in cardid).
 You did not say what was the minimum number of digits are, and
 in you example the first 4 "ACSII digits" are letters not numbers that
 introduce more uniqueness then numbers. Also for a single machine would
 it always see the same country code?
>>> The serial number is always 11 characters (0-9, A-Z). The country code
>>> is the country of the card issuer, within a country the card issuer gets
>>> a 2-character prefix and will define the remaining 7 character.
>> OK, so you are looking at how to handle the failure
>> in minidriver.c at line 1071,  not on getting a printable string to show up.
>>
>> 1069 rv = 
>> sc_hex_to_bin(vs->p15card->tokeninfo->serial_number, sn_bin, &sn_len);
>> 1070 if (rv)
>> 1071 return SCARD_E_INVALID_VALUE;
>>
>>by change to something like:
>>
>>  rv = sc_hex_to_bin(vs->p15card->tokeninfo->serial_number, sn_bin, 
>> &sn_len);
>>  if (rv) {
>>  strncpy(s_bin, vs->p15card->tokeninfo->serial_number, 
>> sizeof(sn_bin));
>>  sn_len = strlen(vs->p15card->tokeninfo->serial_number);
>>  if (sn_len < 2) /* really too short to use as a cardid */
>>  return SCARD_E_INVALID_VALUE;
>>  if (sn_len > sizeof(sn_bin)) sn_len = sizeof(sn_bin);
>>  }
>>
>> I have not tried this.
>>
>> Since this fails, in your case, I don't have any objection to adding 
>> something
>> like the above.
>>
 If you have 9 ASCII characters that should introduce enough uniqueness
 to avoid conflicts with your other cards and other vendors cards.

 One point I am trying to make is the cardid value is not really seen
 by the user, thus it does not have to be printable, and it could
 hold more uniqueness then a printable string. But if there is not
 enough unique data on the card to populate the cardid you have to use
 whatever you have.
>>> Yes, I understand. I'm just concerned about the serial number visible to
>>> the user at the PKCS#15 and PKCS#11 level. There it would be nice to see
>>> the same serial number as the one printed on the card. My point is, that
>>> currently the minidriver silently assumes that the
>>> tokeninfo->serial_number contains a string with hexadecimal characters.
> Our proposed change (see [1]) will not alter the current behaviour with
> existing cards. It will just allow a card that uses a ASCII serial
> number to work as well.
>
> An alternative approach - and probably more invasive - would be to use
> the result of SC_CARDCTL_GET_SERIALNR in minidriver.c as input for the
> cardid file. This way we could still have our human readable serial
> number at the PKCS#11 und PKCS#15 level and a little more uniqueness in
> the cardid file.
 On some cards whewre there is no serial readable form the card the
 SC_CARDCTL_GET_SERIALNR does similar tricts to come up with a "serial 
 number"
 from what ever data it can use on the card.


> This will however break existing installations, as the
> content of the cardid file might change with the driver update.
>
 Yes it might break existing inst

Re: [opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Andreas Schwier
Yes, that's basically what our patch is all about. There are actually
two places in minidriver.c where the tokeninfo->serial_number value is
copied. We propose to change both as you can see in [1].

Andreas

[1]
https://github.com/CardContact/OpenSC/commit/724cdd06e23ecd2e822bd1f138d9c3fbdafe9324

Am 22.08.2012 20:30, schrieb Douglas E. Engert:
>
> On 8/22/2012 11:24 AM, Andreas Schwier (ML) wrote:
>> Hi Douglas,
>>
>> see below.
>>
>> Am 22.08.2012 18:00, schrieb Douglas E. Engert:
>>> On 8/22/2012 10:09 AM, Andreas Schwier wrote:
 Hi Douglas,

 thanks for your infos.

 The minidriver.c already ensures that the cardid file is always 16 byte.
 It does this by repeating the token serial number until 16 bytes are 
 filled.
>>> Unfortunately that gives OpenbSC 16 bytes but does not improve the 
>>> uniqunness.
>>>
>>> Fortunately the uniqueness today only needs to extend over all the cards
>>> as seen on a single machine which may be only a hand full. the cardid
>>> is not sent to AD for example.  But it also means that if the certificates
>>> or keys on a card are changed, the cardid should also change.
>>>
 We can ensure uniqueness of the serial number for our cards, but no
 uniqueness among all other card vendors. There remains a (very) little
 probability that a hexadecimal encoded serial number of another vendor's
 card resembles one of our ASCII serial numbers.

 Our serial numbers are based on the numbering scheme for machine
 readable travel documents, a 2 digit country code followed by up to 9
 ASCII digits (e.g. UTTM1234567 equals 5554544D313233343536375554544D31
 in cardid).
>>> You did not say what was the minimum number of digits are, and
>>> in you example the first 4 "ACSII digits" are letters not numbers that
>>> introduce more uniqueness then numbers. Also for a single machine would
>>> it always see the same country code?
>> The serial number is always 11 characters (0-9, A-Z). The country code
>> is the country of the card issuer, within a country the card issuer gets
>> a 2-character prefix and will define the remaining 7 character.
> OK, so you are looking at how to handle the failure
> in minidriver.c at line 1071,  not on getting a printable string to show up.
>
> 1069 rv = 
> sc_hex_to_bin(vs->p15card->tokeninfo->serial_number, sn_bin, &sn_len);
> 1070 if (rv)
> 1071 return SCARD_E_INVALID_VALUE;
>
>   by change to something like:
>
>   rv = sc_hex_to_bin(vs->p15card->tokeninfo->serial_number, sn_bin, 
> &sn_len);
>   if (rv) {
>   strncpy(s_bin, vs->p15card->tokeninfo->serial_number, 
> sizeof(sn_bin));
>   sn_len = strlen(vs->p15card->tokeninfo->serial_number);
>   if (sn_len < 2) /* really too short to use as a cardid */
>   return SCARD_E_INVALID_VALUE;
>   if (sn_len > sizeof(sn_bin)) sn_len = sizeof(sn_bin);
>   }
>
> I have not tried this.
>
> Since this fails, in your case, I don't have any objection to adding something
> like the above.
>
>>> If you have 9 ASCII characters that should introduce enough uniqueness
>>> to avoid conflicts with your other cards and other vendors cards.
>>>
>>> One point I am trying to make is the cardid value is not really seen
>>> by the user, thus it does not have to be printable, and it could
>>> hold more uniqueness then a printable string. But if there is not
>>> enough unique data on the card to populate the cardid you have to use
>>> whatever you have.
>> Yes, I understand. I'm just concerned about the serial number visible to
>> the user at the PKCS#15 and PKCS#11 level. There it would be nice to see
>> the same serial number as the one printed on the card. My point is, that
>> currently the minidriver silently assumes that the
>> tokeninfo->serial_number contains a string with hexadecimal characters.
 Our proposed change (see [1]) will not alter the current behaviour with
 existing cards. It will just allow a card that uses a ASCII serial
 number to work as well.

 An alternative approach - and probably more invasive - would be to use
 the result of SC_CARDCTL_GET_SERIALNR in minidriver.c as input for the
 cardid file. This way we could still have our human readable serial
 number at the PKCS#11 und PKCS#15 level and a little more uniqueness in
 the cardid file.
>>> On some cards whewre there is no serial readable form the card the
>>> SC_CARDCTL_GET_SERIALNR does similar tricts to come up with a "serial 
>>> number"
>>> from what ever data it can use on the card.
>>>
>>>
 This will however break existing installations, as the
 content of the cardid file might change with the driver update.

>>> Yes it might break existing installations, as it would look like  a new card
>>> to the application, but with the same certificate on two cards. This could 
>>> be
>>> an issue if Windows searches the cer

Re: [opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Douglas E. Engert


On 8/22/2012 11:24 AM, Andreas Schwier (ML) wrote:
> Hi Douglas,
>
> see below.
>
> Am 22.08.2012 18:00, schrieb Douglas E. Engert:
>>
>> On 8/22/2012 10:09 AM, Andreas Schwier wrote:
>>> Hi Douglas,
>>>
>>> thanks for your infos.
>>>
>>> The minidriver.c already ensures that the cardid file is always 16 byte.
>>> It does this by repeating the token serial number until 16 bytes are filled.
>> Unfortunately that gives OpenbSC 16 bytes but does not improve the 
>> uniqunness.
>>
>> Fortunately the uniqueness today only needs to extend over all the cards
>> as seen on a single machine which may be only a hand full. the cardid
>> is not sent to AD for example.  But it also means that if the certificates
>> or keys on a card are changed, the cardid should also change.
>>
>>> We can ensure uniqueness of the serial number for our cards, but no
>>> uniqueness among all other card vendors. There remains a (very) little
>>> probability that a hexadecimal encoded serial number of another vendor's
>>> card resembles one of our ASCII serial numbers.
>>>
>>> Our serial numbers are based on the numbering scheme for machine
>>> readable travel documents, a 2 digit country code followed by up to 9
>>> ASCII digits (e.g. UTTM1234567 equals 5554544D313233343536375554544D31
>>> in cardid).
>> You did not say what was the minimum number of digits are, and
>> in you example the first 4 "ACSII digits" are letters not numbers that
>> introduce more uniqueness then numbers. Also for a single machine would
>> it always see the same country code?
> The serial number is always 11 characters (0-9, A-Z). The country code
> is the country of the card issuer, within a country the card issuer gets
> a 2-character prefix and will define the remaining 7 character.

OK, so you are looking at how to handle the failure
in minidriver.c at line 1071,  not on getting a printable string to show up.

1069 rv = sc_hex_to_bin(vs->p15card->tokeninfo->serial_number, 
sn_bin, &sn_len);
1070 if (rv)
1071 return SCARD_E_INVALID_VALUE;

  by change to something like:

rv = sc_hex_to_bin(vs->p15card->tokeninfo->serial_number, sn_bin, 
&sn_len);
if (rv) {
strncpy(s_bin, vs->p15card->tokeninfo->serial_number, 
sizeof(sn_bin));
sn_len = strlen(vs->p15card->tokeninfo->serial_number);
if (sn_len < 2) /* really too short to use as a cardid */
return SCARD_E_INVALID_VALUE;
if (sn_len > sizeof(sn_bin)) sn_len = sizeof(sn_bin);
}

I have not tried this.

Since this fails, in your case, I don't have any objection to adding something
like the above.

>>
>> If you have 9 ASCII characters that should introduce enough uniqueness
>> to avoid conflicts with your other cards and other vendors cards.
>>
>> One point I am trying to make is the cardid value is not really seen
>> by the user, thus it does not have to be printable, and it could
>> hold more uniqueness then a printable string. But if there is not
>> enough unique data on the card to populate the cardid you have to use
>> whatever you have.
> Yes, I understand. I'm just concerned about the serial number visible to
> the user at the PKCS#15 and PKCS#11 level. There it would be nice to see
> the same serial number as the one printed on the card. My point is, that
> currently the minidriver silently assumes that the
> tokeninfo->serial_number contains a string with hexadecimal characters.
>>
>>> Our proposed change (see [1]) will not alter the current behaviour with
>>> existing cards. It will just allow a card that uses a ASCII serial
>>> number to work as well.
>>>
>>> An alternative approach - and probably more invasive - would be to use
>>> the result of SC_CARDCTL_GET_SERIALNR in minidriver.c as input for the
>>> cardid file. This way we could still have our human readable serial
>>> number at the PKCS#11 und PKCS#15 level and a little more uniqueness in
>>> the cardid file.
>> On some cards whewre there is no serial readable form the card the
>> SC_CARDCTL_GET_SERIALNR does similar tricts to come up with a "serial number"
>> from what ever data it can use on the card.
>>
>>
>>> This will however break existing installations, as the
>>> content of the cardid file might change with the driver update.
>>>
>> Yes it might break existing installations, as it would look like  a new card
>> to the application, but with the same certificate on two cards. This could be
>> an issue if Windows searches the cert store for a certificate, then asks the
>> user to insert the matching card. i.e. the old card, not the new one.
>>
>> As long as you have 6 digits or characters in your printable string that 
>> should
>> be fine.
>>
>>> Andreas
>>>
>>> [1]
>>> https://github.com/CardContact/OpenSC/commit/724cdd06e23ecd2e822bd1f138d9c3fbdafe9324
>>>
>>> Am 22.08.2012 16:29, schrieb Douglas E. Engert:
 On 8/22/2012 5:28 AM, Andreas Schwier (ML) wrote:
> Hi e

Re: [opensc-devel] encrypt / decrypt

2012-08-22 Thread Douglas E. Engert


On 8/22/2012 10:51 AM, j.witvl...@mindef.nl wrote:
> -Original Message-
> From: opensc-devel-boun...@lists.opensc-project.org 
> [mailto:opensc-devel-boun...@lists.opensc-project.org] On Behalf Of Douglas 
> E. Engert
> Sent: Wednesday, August 22, 2012 5:12 PM
> To: opensc-devel@lists.opensc-project.org
> Subject: Re: [opensc-devel] encrypt / decrypt
>
>
>
> On 8/22/2012 9:50 AM, j.witvl...@mindef.nl wrote:
>> Hi all,
>>
>> I've been trying to make more use of our smartcards, but I think I am 
>> missing the point some how.
>> What I would like to do is:
>> a) encrypt some data, by means of one of my private keys on my smartcard
>> someone else should be able to decrypt it with the public key on my 
>> certificate.
>>
>> b) let someone else encrypt some data, by means of my public key on my 
>> certificate.
>> I should be able to decrypt it with one of my private keys on my smartcard.
>>
>> I speak in plural about keys/certificates, cause we have different pairs for 
>> authentication/non-repodiation/etc
>>
>> So first I load the engine:
>> OpenSSL> engine dynamic -pre SO_PATH:/usr/lib/engines/engine_pkcs11.so  -pre 
>> ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre 
>> MODULE_PATH:/usr/lib/libaetpkss.so.3.0
>> (dynamic) Dynamic engine loading support
>> [Success]: SO_PATH:/usr/lib/engines/engine_pkcs11.so
>> [Success]: ID:pkcs11
>> [Success]: LIST_ADD:1
>> [Success]: LOAD
>> [Success]: MODULE_PATH:/usr/lib/libaetpkss.so.3.0
>> Loaded: (pkcs11) pkcs11 engine
>> OpenSSL>
>>
>> And next I try to encrypt something:
>> OpenSSL>
>> OpenSSL> enc -base64 -in /root/data.txt -out file.txt.enc -engine pkcs11
>> engine "pkcs11" set.
>> OpenSSL>
>>

openssl enc only works with symmetric keys. You could write
your own program to use openssl to use RSA.


>> OpenSSL> enc -d -aes-256-cbc -a -in file.txt.enc -engine pkcs11
>> engine "pkcs11" set.
>> enter aes-256-cbc decryption password:
>> error in enc
>> OpenSSL>
>>
>>
>> I presume, I'll have to specify which private-key (and PIN), although "-k 
>> 41" or "-k 43" does not work either, neither does "-key id_43"
>> Am I missing something, or is this just not possible?
>
> Yes you are missing something. Because asymmetric key encryption like RSA is
> slow and the amount of data that can be encrypted is limited, what is usually
> done is to encrypt the data in a symmetric key, like AES, then encrypt the AES
> key using the RSA public key. the encrypted data and the encrypted key are 
> then
> sent, and the process is reversed using the RSA private key.
>
> This packaging of the message is usually done with something like smime or CMS
> Openssl can do both. (CMS in newer versions only)
> -Original Message-
>
> No, the aspect of using a symmetric key didn't slip my mind.
> That very well when encrypting large amount of data...
> But when the symmetric key is large (compared to the data), then the overhead 
> does not justify the means. (I think)
> And you have to transfer the encrypted key as well as the encrypted data.
>

How short are these messages?

Using PKCS#11 CKM_RSA_X_509, the size of the message must be less then the size 
of
the modulus and if using some padded version between 11 bytes less and maybe 
half
the size of the modulus.

Using RSA directly of a previously sent message will produce the same encrypted
output which could be subject examination or re-play.

Smime and CMS avoid many of these security issues and others.

> Hw
>
> __
> Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet 
> de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt 
> u verzocht dat aan de afzender te melden en het bericht te verwijderen. De 
> Staat aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die 
> verband houdt met risico's verbonden aan het elektronisch verzenden van 
> berichten.
>
> This message may contain information that is not intended for you. If you are 
> not the addressee or if this message was sent to you by mistake, you are 
> requested to inform the sender and delete the message. The State accepts no 
> liability for damage of any kind resulting from the risks inherent in the 
> electronic transmission of messages.
>
>

-- 

  Douglas E. Engert  
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444


___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Andreas Schwier (ML)
Hi Douglas,

see below.

Am 22.08.2012 18:00, schrieb Douglas E. Engert:
>
> On 8/22/2012 10:09 AM, Andreas Schwier wrote:
>> Hi Douglas,
>>
>> thanks for your infos.
>>
>> The minidriver.c already ensures that the cardid file is always 16 byte.
>> It does this by repeating the token serial number until 16 bytes are filled.
> Unfortunately that gives OpenbSC 16 bytes but does not improve the uniqunness.
>
> Fortunately the uniqueness today only needs to extend over all the cards
> as seen on a single machine which may be only a hand full. the cardid
> is not sent to AD for example.  But it also means that if the certificates
> or keys on a card are changed, the cardid should also change.
>
>> We can ensure uniqueness of the serial number for our cards, but no
>> uniqueness among all other card vendors. There remains a (very) little
>> probability that a hexadecimal encoded serial number of another vendor's
>> card resembles one of our ASCII serial numbers.
>>
>> Our serial numbers are based on the numbering scheme for machine
>> readable travel documents, a 2 digit country code followed by up to 9
>> ASCII digits (e.g. UTTM1234567 equals 5554544D313233343536375554544D31
>> in cardid).
> You did not say what was the minimum number of digits are, and
> in you example the first 4 "ACSII digits" are letters not numbers that
> introduce more uniqueness then numbers. Also for a single machine would
> it always see the same country code?
The serial number is always 11 characters (0-9, A-Z). The country code
is the country of the card issuer, within a country the card issuer gets
a 2-character prefix and will define the remaining 7 character.
>
> If you have 9 ASCII characters that should introduce enough uniqueness
> to avoid conflicts with your other cards and other vendors cards.
>
> One point I am trying to make is the cardid value is not really seen
> by the user, thus it does not have to be printable, and it could
> hold more uniqueness then a printable string. But if there is not
> enough unique data on the card to populate the cardid you have to use
> whatever you have.
Yes, I understand. I'm just concerned about the serial number visible to
the user at the PKCS#15 and PKCS#11 level. There it would be nice to see
the same serial number as the one printed on the card. My point is, that
currently the minidriver silently assumes that the
tokeninfo->serial_number contains a string with hexadecimal characters.
>
>> Our proposed change (see [1]) will not alter the current behaviour with
>> existing cards. It will just allow a card that uses a ASCII serial
>> number to work as well.
>>
>> An alternative approach - and probably more invasive - would be to use
>> the result of SC_CARDCTL_GET_SERIALNR in minidriver.c as input for the
>> cardid file. This way we could still have our human readable serial
>> number at the PKCS#11 und PKCS#15 level and a little more uniqueness in
>> the cardid file.
> On some cards whewre there is no serial readable form the card the
> SC_CARDCTL_GET_SERIALNR does similar tricts to come up with a "serial number"
> from what ever data it can use on the card.
>
>
>> This will however break existing installations, as the
>> content of the cardid file might change with the driver update.
>>
> Yes it might break existing installations, as it would look like  a new card
> to the application, but with the same certificate on two cards. This could be
> an issue if Windows searches the cert store for a certificate, then asks the
> user to insert the matching card. i.e. the old card, not the new one.
>
> As long as you have 6 digits or characters in your printable string that 
> should
> be fine.
>
>> Andreas
>>
>> [1]
>> https://github.com/CardContact/OpenSC/commit/724cdd06e23ecd2e822bd1f138d9c3fbdafe9324
>>
>> Am 22.08.2012 16:29, schrieb Douglas E. Engert:
>>> On 8/22/2012 5:28 AM, Andreas Schwier (ML) wrote:
 Hi everyone,

 we've come across an issue with the minidriver which assumes the card
 serial number to be a hex string.

 In our card the serial number is a string composed of ASCII characters.
 This works well with pkcs15-tool and the PKCS#11 library, however it
 fails with the current minidriver when it tries to convert the hex
 string into binary data for the cardid file.

 Neither in PKCS#11 spec nor in ISO 7816-15 I can find a definition for
 encoding the serial number as hex string.
>>> The minidriver does not use the PKCS#11 standards, it is the Microsoft
>>> definition of what it expects in the cardid file that counts.
>>>
>>> http://www.microsoft.com/whdc/device/input/smartcard/sc-minidriver.mspx
>>>
>>> Section 5.4.1 says:
>>>
>>>"The logical name for this file is “CardId”. It is in the root 
>>> directory."
>>>
>>>"The file is organized as a 16-byte array. It should be treated as 
>>> opaque binary data."
>>>
>>>"This value is assigned by Microsoft software to assure that a unique 
>>> value is
>>> generated for 

Re: [opensc-devel] encrypt / decrypt

2012-08-22 Thread J.Witvliet
-Original Message-
From: opensc-devel-boun...@lists.opensc-project.org 
[mailto:opensc-devel-boun...@lists.opensc-project.org] On Behalf Of 
j.witvl...@mindef.nl
Sent: Wednesday, August 22, 2012 5:51 PM
To: deeng...@anl.gov; opensc-devel@lists.opensc-project.org
Subject: Re: [opensc-devel] encrypt / decrypt

-Original Message-
From: opensc-devel-boun...@lists.opensc-project.org 
[mailto:opensc-devel-boun...@lists.opensc-project.org] On Behalf Of Douglas E. 
Engert
Sent: Wednesday, August 22, 2012 5:12 PM
To: opensc-devel@lists.opensc-project.org
Subject: Re: [opensc-devel] encrypt / decrypt



On 8/22/2012 9:50 AM, j.witvl...@mindef.nl wrote:
> Hi all,
>
> I've been trying to make more use of our smartcards, but I think I am missing 
> the point some how.
> What I would like to do is:
> a) encrypt some data, by means of one of my private keys on my smartcard
> someone else should be able to decrypt it with the public key on my 
> certificate.
>
> b) let someone else encrypt some data, by means of my public key on my 
> certificate.
> I should be able to decrypt it with one of my private keys on my smartcard.
>
> I speak in plural about keys/certificates, cause we have different pairs for 
> authentication/non-repodiation/etc
>
> So first I load the engine:
> OpenSSL> engine dynamic -pre SO_PATH:/usr/lib/engines/engine_pkcs11.so  -pre 
> ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre 
> MODULE_PATH:/usr/lib/libaetpkss.so.3.0
> (dynamic) Dynamic engine loading support
> [Success]: SO_PATH:/usr/lib/engines/engine_pkcs11.so
> [Success]: ID:pkcs11
> [Success]: LIST_ADD:1
> [Success]: LOAD
> [Success]: MODULE_PATH:/usr/lib/libaetpkss.so.3.0
> Loaded: (pkcs11) pkcs11 engine
> OpenSSL>
>
> And next I try to encrypt something:
> OpenSSL>
> OpenSSL> enc -base64 -in /root/data.txt -out file.txt.enc -engine pkcs11
> engine "pkcs11" set.
> OpenSSL>
>
> OpenSSL> enc -d -aes-256-cbc -a -in file.txt.enc -engine pkcs11
> engine "pkcs11" set.
> enter aes-256-cbc decryption password:
> error in enc
> OpenSSL>
>
>
> I presume, I'll have to specify which private-key (and PIN), although "-k 41" 
> or "-k 43" does not work either, neither does "-key id_43"
> Am I missing something, or is this just not possible?

Yes you are missing something. Because asymmetric key encryption like RSA is
slow and the amount of data that can be encrypted is limited, what is usually
done is to encrypt the data in a symmetric key, like AES, then encrypt the AES
key using the RSA public key. the encrypted data and the encrypted key are then
sent, and the process is reversed using the RSA private key.

This packaging of the message is usually done with something like smime or CMS
Openssl can do both. (CMS in newer versions only)
-Original Message-

Or actually, if you mean that I took the wrong tool from the gigantic 
openssl-toolbox...
When looking at openssl-manpage I see...
 `openssl smime -sign -in text.plain -text -out text.encr -signer mycert.pem 
-inkey mykey.pem -certfile mycerts.pem´
So how should I point to the keys and crt on the smartcard?

Hw


__
Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet 
de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u 
verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat 
aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband 
houdt met risico's verbonden aan het elektronisch verzenden van berichten.

This message may contain information that is not intended for you. If you are 
not the addressee or if this message was sent to you by mistake, you are 
requested to inform the sender and delete the message. The State accepts no 
liability for damage of any kind resulting from the risks inherent in the 
electronic transmission of messages.
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Douglas E. Engert


On 8/22/2012 10:09 AM, Andreas Schwier wrote:
> Hi Douglas,
>
> thanks for your infos.
>
> The minidriver.c already ensures that the cardid file is always 16 byte.
> It does this by repeating the token serial number until 16 bytes are filled.

Unfortunately that gives OpenbSC 16 bytes but does not improve the uniqunness.

Fortunately the uniqueness today only needs to extend over all the cards
as seen on a single machine which may be only a hand full. the cardid
is not sent to AD for example.  But it also means that if the certificates
or keys on a card are changed, the cardid should also change.

>
> We can ensure uniqueness of the serial number for our cards, but no
> uniqueness among all other card vendors. There remains a (very) little
> probability that a hexadecimal encoded serial number of another vendor's
> card resembles one of our ASCII serial numbers.
>
> Our serial numbers are based on the numbering scheme for machine
> readable travel documents, a 2 digit country code followed by up to 9
> ASCII digits (e.g. UTTM1234567 equals 5554544D313233343536375554544D31
> in cardid).

You did not say what was the minimum number of digits are, and
in you example the first 4 "ACSII digits" are letters not numbers that
introduce more uniqueness then numbers. Also for a single machine would
it always see the same country code?

If you have 9 ASCII characters that should introduce enough uniqueness
to avoid conflicts with your other cards and other vendors cards.

One point I am trying to make is the cardid value is not really seen
by the user, thus it does not have to be printable, and it could
hold more uniqueness then a printable string. But if there is not
enough unique data on the card to populate the cardid you have to use
whatever you have.

>
> Our proposed change (see [1]) will not alter the current behaviour with
> existing cards. It will just allow a card that uses a ASCII serial
> number to work as well.
>
> An alternative approach - and probably more invasive - would be to use
> the result of SC_CARDCTL_GET_SERIALNR in minidriver.c as input for the
> cardid file. This way we could still have our human readable serial
> number at the PKCS#11 und PKCS#15 level and a little more uniqueness in
> the cardid file.

On some cards whewre there is no serial readable form the card the
SC_CARDCTL_GET_SERIALNR does similar tricts to come up with a "serial number"
from what ever data it can use on the card.


> This will however break existing installations, as the
> content of the cardid file might change with the driver update.
>

Yes it might break existing installations, as it would look like  a new card
to the application, but with the same certificate on two cards. This could be
an issue if Windows searches the cert store for a certificate, then asks the
user to insert the matching card. i.e. the old card, not the new one.

As long as you have 6 digits or characters in your printable string that should
be fine.

> Andreas
>
> [1]
> https://github.com/CardContact/OpenSC/commit/724cdd06e23ecd2e822bd1f138d9c3fbdafe9324
>
> Am 22.08.2012 16:29, schrieb Douglas E. Engert:
>>
>> On 8/22/2012 5:28 AM, Andreas Schwier (ML) wrote:
>>> Hi everyone,
>>>
>>> we've come across an issue with the minidriver which assumes the card
>>> serial number to be a hex string.
>>>
>>> In our card the serial number is a string composed of ASCII characters.
>>> This works well with pkcs15-tool and the PKCS#11 library, however it
>>> fails with the current minidriver when it tries to convert the hex
>>> string into binary data for the cardid file.
>>>
>>> Neither in PKCS#11 spec nor in ISO 7816-15 I can find a definition for
>>> encoding the serial number as hex string.
>> The minidriver does not use the PKCS#11 standards, it is the Microsoft
>> definition of what it expects in the cardid file that counts.
>>
>> http://www.microsoft.com/whdc/device/input/smartcard/sc-minidriver.mspx
>>
>> Section 5.4.1 says:
>>
>>"The logical name for this file is “CardId”. It is in the root directory."
>>
>>"The file is organized as a 16-byte array. It should be treated as opaque 
>> binary data."
>>
>>"This value is assigned by Microsoft software to assure that a unique 
>> value is
>> generated for the card. It is unrelated to the serial number that may or 
>> may not
>> be assigned to the card during manufacture."
>>
>> In other places it calls it as a GUID.
>>
>> This also means that when displayed, it maybe displayed as a GUID as hex 
>> digits
>> with "{", "}" "," and "-"  added for readability, and some bytes reversed in 
>> little
>> endian machines. So it may not be recognizable as your serial number.
>>
>> That said, since the minidriver is emulating a card that should have a 
>> cardid file,
>> the data to populate the emulated cardid file has to come from the card and 
>> be the same
>> at every use,  and unique across all cards not just one site or one card 
>> vendor.
>>
>> The value or its derivatives are stor

Re: [opensc-devel] encrypt / decrypt

2012-08-22 Thread J.Witvliet
-Original Message-
From: opensc-devel-boun...@lists.opensc-project.org 
[mailto:opensc-devel-boun...@lists.opensc-project.org] On Behalf Of Douglas E. 
Engert
Sent: Wednesday, August 22, 2012 5:12 PM
To: opensc-devel@lists.opensc-project.org
Subject: Re: [opensc-devel] encrypt / decrypt



On 8/22/2012 9:50 AM, j.witvl...@mindef.nl wrote:
> Hi all,
>
> I've been trying to make more use of our smartcards, but I think I am missing 
> the point some how.
> What I would like to do is:
> a) encrypt some data, by means of one of my private keys on my smartcard
> someone else should be able to decrypt it with the public key on my 
> certificate.
>
> b) let someone else encrypt some data, by means of my public key on my 
> certificate.
> I should be able to decrypt it with one of my private keys on my smartcard.
>
> I speak in plural about keys/certificates, cause we have different pairs for 
> authentication/non-repodiation/etc
>
> So first I load the engine:
> OpenSSL> engine dynamic -pre SO_PATH:/usr/lib/engines/engine_pkcs11.so  -pre 
> ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre 
> MODULE_PATH:/usr/lib/libaetpkss.so.3.0
> (dynamic) Dynamic engine loading support
> [Success]: SO_PATH:/usr/lib/engines/engine_pkcs11.so
> [Success]: ID:pkcs11
> [Success]: LIST_ADD:1
> [Success]: LOAD
> [Success]: MODULE_PATH:/usr/lib/libaetpkss.so.3.0
> Loaded: (pkcs11) pkcs11 engine
> OpenSSL>
>
> And next I try to encrypt something:
> OpenSSL>
> OpenSSL> enc -base64 -in /root/data.txt -out file.txt.enc -engine pkcs11
> engine "pkcs11" set.
> OpenSSL>
>
> OpenSSL> enc -d -aes-256-cbc -a -in file.txt.enc -engine pkcs11
> engine "pkcs11" set.
> enter aes-256-cbc decryption password:
> error in enc
> OpenSSL>
>
>
> I presume, I'll have to specify which private-key (and PIN), although "-k 41" 
> or "-k 43" does not work either, neither does "-key id_43"
> Am I missing something, or is this just not possible?

Yes you are missing something. Because asymmetric key encryption like RSA is
slow and the amount of data that can be encrypted is limited, what is usually
done is to encrypt the data in a symmetric key, like AES, then encrypt the AES
key using the RSA public key. the encrypted data and the encrypted key are then
sent, and the process is reversed using the RSA private key.

This packaging of the message is usually done with something like smime or CMS
Openssl can do both. (CMS in newer versions only)
-Original Message-

No, the aspect of using a symmetric key didn't slip my mind.
That very well when encrypting large amount of data...
But when the symmetric key is large (compared to the data), then the overhead 
does not justify the means. (I think)
And you have to transfer the encrypted key as well as the encrypted data.

Hw

__
Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet 
de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u 
verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat 
aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband 
houdt met risico's verbonden aan het elektronisch verzenden van berichten.

This message may contain information that is not intended for you. If you are 
not the addressee or if this message was sent to you by mistake, you are 
requested to inform the sender and delete the message. The State accepts no 
liability for damage of any kind resulting from the risks inherent in the 
electronic transmission of messages.
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] C_GetSlotList() returns 0 slots in Linux?

2012-08-22 Thread Ludovic Rousseau
2012/8/22 Andrew Zitnay :
> I have a Linux user that I'm trying to get working with OpenSC.
>   However, according to my logs, C_GetSlotList() is finding 0 slots.
>   I'm unable to reproduce this problem on my own Linux box.
>
> The user claims the smart card reader is plugged in and working properly
> in Firefox/Thunderbird:
>
> Bus 004 Device 012: ID 058f:9540 Alcor Micro Corp.
> In Firefox´s Device Manager:
> Security Modules and Devices:
> PKCS11
> Module PKCS11
> Path /usr/lib/opensc-pkcs11.so

OpenSC loads libpcsclite.so.1 dynamically at run time.
Check the path is correct in provider_library definition of the
/etc/opensc.conf file.

Bye

-- 
 Dr. Ludovic Rousseau
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Re: [opensc-devel] encrypt / decrypt

2012-08-22 Thread Douglas E. Engert


On 8/22/2012 9:50 AM, j.witvl...@mindef.nl wrote:
> Hi all,
>
> I've been trying to make more use of our smartcards, but I think I am missing 
> the point some how.
> What I would like to do is:
> a) encrypt some data, by means of one of my private keys on my smartcard
> someone else should be able to decrypt it with the public key on my 
> certificate.
>
> b) let someone else encrypt some data, by means of my public key on my 
> certificate.
> I should be able to decrypt it with one of my private keys on my smartcard.
>
> I speak in plural about keys/certificates, cause we have different pairs for 
> authentication/non-repodiation/etc
>
> So first I load the engine:
> OpenSSL> engine dynamic -pre SO_PATH:/usr/lib/engines/engine_pkcs11.so  -pre 
> ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre 
> MODULE_PATH:/usr/lib/libaetpkss.so.3.0
> (dynamic) Dynamic engine loading support
> [Success]: SO_PATH:/usr/lib/engines/engine_pkcs11.so
> [Success]: ID:pkcs11
> [Success]: LIST_ADD:1
> [Success]: LOAD
> [Success]: MODULE_PATH:/usr/lib/libaetpkss.so.3.0
> Loaded: (pkcs11) pkcs11 engine
> OpenSSL>
>
> And next I try to encrypt something:
> OpenSSL>
> OpenSSL> enc -base64 -in /root/data.txt -out file.txt.enc -engine pkcs11
> engine "pkcs11" set.
> OpenSSL>
>
> OpenSSL> enc -d -aes-256-cbc -a -in file.txt.enc -engine pkcs11
> engine "pkcs11" set.
> enter aes-256-cbc decryption password:
> error in enc
> OpenSSL>
>
>
> I presume, I'll have to specify which private-key (and PIN), although "-k 41" 
> or "-k 43" does not work either, neither does "-key id_43"
> Am I missing something, or is this just not possible?

Yes you are missing something. Because asymmetric key encryption like RSA is
slow and the amount of data that can be encrypted is limited, what is usually
done is to encrypt the data in a symmetric key, like AES, then encrypt the AES
key using the RSA public key. the encrypted data and the encrypted key are then
sent, and the process is reversed using the RSA private key.

This packaging of the message is usually done with something like smime or CMS
Openssl can do both. (CMS in newer versions only)

>
> Hans
>
>
> __
> Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet 
> de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt 
> u verzocht dat aan de afzender te melden en het bericht te verwijderen. De 
> Staat aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die 
> verband houdt met risico's verbonden aan het elektronisch verzenden van 
> berichten.
>
> This message may contain information that is not intended for you. If you are 
> not the addressee or if this message was sent to you by mistake, you are 
> requested to inform the sender and delete the message. The State accepts no 
> liability for damage of any kind resulting from the risks inherent in the 
> electronic transmission of messages.
> ___
> opensc-devel mailing list
> opensc-devel@lists.opensc-project.org
> http://www.opensc-project.org/mailman/listinfo/opensc-devel
>
>

-- 

  Douglas E. Engert  
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444


___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Andreas Schwier
Hi Douglas,

thanks for your infos.

The minidriver.c already ensures that the cardid file is always 16 byte.
It does this by repeating the token serial number until 16 bytes are filled.

We can ensure uniqueness of the serial number for our cards, but no
uniqueness among all other card vendors. There remains a (very) little
probability that a hexadecimal encoded serial number of another vendor's
card resembles one of our ASCII serial numbers.

Our serial numbers are based on the numbering scheme for machine
readable travel documents, a 2 digit country code followed by up to 9
ASCII digits (e.g. UTTM1234567 equals 5554544D313233343536375554544D31
in cardid).

Our proposed change (see [1]) will not alter the current behaviour with
existing cards. It will just allow a card that uses a ASCII serial
number to work as well.

An alternative approach - and probably more invasive - would be to use
the result of SC_CARDCTL_GET_SERIALNR in minidriver.c as input for the
cardid file. This way we could still have our human readable serial
number at the PKCS#11 und PKCS#15 level and a little more uniqueness in
the cardid file. This will however break existing installations, as the
content of the cardid file might change with the driver update.

Andreas

[1]
https://github.com/CardContact/OpenSC/commit/724cdd06e23ecd2e822bd1f138d9c3fbdafe9324

Am 22.08.2012 16:29, schrieb Douglas E. Engert:
>
> On 8/22/2012 5:28 AM, Andreas Schwier (ML) wrote:
>> Hi everyone,
>>
>> we've come across an issue with the minidriver which assumes the card
>> serial number to be a hex string.
>>
>> In our card the serial number is a string composed of ASCII characters.
>> This works well with pkcs15-tool and the PKCS#11 library, however it
>> fails with the current minidriver when it tries to convert the hex
>> string into binary data for the cardid file.
>>
>> Neither in PKCS#11 spec nor in ISO 7816-15 I can find a definition for
>> encoding the serial number as hex string.
> The minidriver does not use the PKCS#11 standards, it is the Microsoft
> definition of what it expects in the cardid file that counts.
>
> http://www.microsoft.com/whdc/device/input/smartcard/sc-minidriver.mspx
>
> Section 5.4.1 says:
>
>   "The logical name for this file is “CardId”. It is in the root directory."
>
>   "The file is organized as a 16-byte array. It should be treated as opaque 
> binary data."
>
>   "This value is assigned by Microsoft software to assure that a unique value 
> is
>generated for the card. It is unrelated to the serial number that may or 
> may not
>be assigned to the card during manufacture."
>
> In other places it calls it as a GUID.
>
> This also means that when displayed, it maybe displayed as a GUID as hex 
> digits
> with "{", "}" "," and "-"  added for readability, and some bytes reversed in 
> little
> endian machines. So it may not be recognizable as your serial number.
>
> That said, since the minidriver is emulating a card that should have a cardid 
> file,
> the data to populate the emulated cardid file has to come from the card and 
> be the same
> at every use,  and unique across all cards not just one site or one card 
> vendor.
>
> The value or its derivatives are stored in the certificate store and used
> to associate cards with data previously cached.
>
>> I therefore propose to change the code in minidriver.c to do the following:
>>
>> 1. try parsing tokeninfo->serial_number as hex string
>> 2. if that fails copy serial_number as is with the length being the
>> length of the ASCII encoded string
> It must be 16 bytes.
>
>> This should not interfere with current card drivers which all use a hex
>> string as serial number.
>>
>> Any objections ?
> If you can show that your method has enough uniqueness, to not cause problems
> with other cards, then no.
>
>> Andreas
>>


-- 

-CardContact Software & System Consulting
   |.##> <##.|   Andreas Schwier
   |#   #|   Schülerweg 38
   |#   #|   32429 Minden, Germany
   |'##> <##'|   Phone +49 171 8334920
-http://www.cardcontact.de
 http://www.tscons.de
 http://www.openscdp.org

___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

[opensc-devel] encrypt / decrypt

2012-08-22 Thread J.Witvliet
Hi all,

I've been trying to make more use of our smartcards, but I think I am missing 
the point some how.
What I would like to do is:
a) encrypt some data, by means of one of my private keys on my smartcard
someone else should be able to decrypt it with the public key on my certificate.

b) let someone else encrypt some data, by means of my public key on my 
certificate.
I should be able to decrypt it with one of my private keys on my smartcard.

I speak in plural about keys/certificates, cause we have different pairs for 
authentication/non-repodiation/etc

So first I load the engine:
OpenSSL> engine dynamic -pre SO_PATH:/usr/lib/engines/engine_pkcs11.so  -pre 
ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre MODULE_PATH:/usr/lib/libaetpkss.so.3.0 
(dynamic) Dynamic engine loading support
[Success]: SO_PATH:/usr/lib/engines/engine_pkcs11.so
[Success]: ID:pkcs11
[Success]: LIST_ADD:1
[Success]: LOAD
[Success]: MODULE_PATH:/usr/lib/libaetpkss.so.3.0
Loaded: (pkcs11) pkcs11 engine
OpenSSL>

And next I try to encrypt something:
OpenSSL> 
OpenSSL> enc -base64 -in /root/data.txt -out file.txt.enc -engine pkcs11
engine "pkcs11" set.
OpenSSL> 

OpenSSL> enc -d -aes-256-cbc -a -in file.txt.enc -engine pkcs11
engine "pkcs11" set.
enter aes-256-cbc decryption password:
error in enc
OpenSSL>


I presume, I'll have to specify which private-key (and PIN), although "-k 41" 
or "-k 43" does not work either, neither does "-key id_43"
Am I missing something, or is this just not possible?

Hans


__
Dit bericht kan informatie bevatten die niet voor u is bestemd. Indien u niet 
de geadresseerde bent of dit bericht abusievelijk aan u is toegezonden, wordt u 
verzocht dat aan de afzender te melden en het bericht te verwijderen. De Staat 
aanvaardt geen aansprakelijkheid voor schade, van welke aard ook, die verband 
houdt met risico's verbonden aan het elektronisch verzenden van berichten.

This message may contain information that is not intended for you. If you are 
not the addressee or if this message was sent to you by mistake, you are 
requested to inform the sender and delete the message. The State accepts no 
liability for damage of any kind resulting from the risks inherent in the 
electronic transmission of messages.
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Douglas E. Engert


On 8/22/2012 5:28 AM, Andreas Schwier (ML) wrote:
> Hi everyone,
>
> we've come across an issue with the minidriver which assumes the card
> serial number to be a hex string.
>
> In our card the serial number is a string composed of ASCII characters.
> This works well with pkcs15-tool and the PKCS#11 library, however it
> fails with the current minidriver when it tries to convert the hex
> string into binary data for the cardid file.
>
> Neither in PKCS#11 spec nor in ISO 7816-15 I can find a definition for
> encoding the serial number as hex string.

The minidriver does not use the PKCS#11 standards, it is the Microsoft
definition of what it expects in the cardid file that counts.

http://www.microsoft.com/whdc/device/input/smartcard/sc-minidriver.mspx

Section 5.4.1 says:

  "The logical name for this file is “CardId”. It is in the root directory."

  "The file is organized as a 16-byte array. It should be treated as opaque 
binary data."

  "This value is assigned by Microsoft software to assure that a unique value is
   generated for the card. It is unrelated to the serial number that may or may 
not
   be assigned to the card during manufacture."

In other places it calls it as a GUID.

This also means that when displayed, it maybe displayed as a GUID as hex digits
with "{", "}" "," and "-"  added for readability, and some bytes reversed in 
little
endian machines. So it may not be recognizable as your serial number.

That said, since the minidriver is emulating a card that should have a cardid 
file,
the data to populate the emulated cardid file has to come from the card and be 
the same
at every use,  and unique across all cards not just one site or one card vendor.

The value or its derivatives are stored in the certificate store and used
to associate cards with data previously cached.

>
> I therefore propose to change the code in minidriver.c to do the following:
>
> 1. try parsing tokeninfo->serial_number as hex string
> 2. if that fails copy serial_number as is with the length being the
> length of the ASCII encoded string

It must be 16 bytes.

>
> This should not interfere with current card drivers which all use a hex
> string as serial number.
>
> Any objections ?

If you can show that your method has enough uniqueness, to not cause problems
with other cards, then no.

>
> Andreas
>

-- 

  Douglas E. Engert  
  Argonne National Laboratory
  9700 South Cass Avenue
  Argonne, Illinois  60439
  (630) 252-5444


___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

[opensc-devel] C_GetSlotList() returns 0 slots in Linux?

2012-08-22 Thread Andrew Zitnay
I have a Linux user that I'm trying to get working with OpenSC. 
  However, according to my logs, C_GetSlotList() is finding 0 slots. 
  I'm unable to reproduce this problem on my own Linux box.

The user claims the smart card reader is plugged in and working properly 
in Firefox/Thunderbird:

Bus 004 Device 012: ID 058f:9540 Alcor Micro Corp.
In Firefox´s Device Manager:
Security Modules and Devices:
PKCS11
Module PKCS11
Path /usr/lib/opensc-pkcs11.so

The user's pcsc_scan output is as follows:

~$ pcsc_scan
PC/SC device scanner
V 1.4.18 (c) 2001-2011, Ludovic Rousseau 
Compiled with PC/SC lite version: 1.7.4
Using reader plug'n play mechanism
Scanning present readers...
0: Alcor Micro AU9540 00 00

Tue Aug 21 16:05:52 2012
Reader 0: Alcor Micro AU9540 00 00
Card state: Card inserted, Shared Mode,
ATR: 3B 7F 38 00 00 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00

ATR: 3B 7F 38 00 00 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00
+ TS = 3B --> Direct Convention
+ T0 = 7F, Y(1): 0111, K: 15 (historical bytes)
TA(1) = 38 --> Fi=744, Di=12, 62 cycles/ETU
64516 bits/s at 4 MHz, fMax for Fi = 8 MHz => 129032 bits/s
TB(1) = 00 --> VPP is not electrically connected
TC(1) = 00 --> Extra guard time: 0
+ Historical bytes: 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00
Category indicator byte: 00 (compact TLV data object)
Tag: 6, len: A (pre-issuing data)
Data: 44 4E 49 65 10 02 4C 34 01 13
Mandatory status indicator (3 last bytes)
LCS (life card cycle): 03 (Initialisation state)
SW: 9000 (Normal processing.)

Possibly identified card (using /usr/share/pcsc/smartcard_list.txt):
3B 7F 38 00 00 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00
3B 7F 38 00 00 00 6A 44 4E 49 65 [1,2]0 02 4C 34 01 13 03 90 00
DNI electronico (Spanish electronic ID card)
http://www.dnielectronico.es

If anyone has any ideas on further debugging, please let me know, as I'm 
not sure where to take it next.
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


[opensc-devel] C_GetSlotList() returns 0 slots in Linux?

2012-08-22 Thread azitnay

I have a Linux user that I'm trying to get working with OpenSC.  However,
according to my logs, C_GetSlotList() is finding 0 slots.  I'm unable to
reproduce this problem on my own Linux box.

The user claims the smart card reader is plugged in and working properly in
Firefox/Thunderbird:

Bus 004 Device 012: ID 058f:9540 Alcor Micro Corp.
In Firefox´s Device Manager:
Security Modules and Devices:
PKCS11
Module PKCS11
Path /usr/lib/opensc-pkcs11.so

The user's pcsc_scan output is as follows:

~$ pcsc_scan
PC/SC device scanner
V 1.4.18 (c) 2001-2011, Ludovic Rousseau 
Compiled with PC/SC lite version: 1.7.4
Using reader plug'n play mechanism
Scanning present readers...
0: Alcor Micro AU9540 00 00

Tue Aug 21 16:05:52 2012
Reader 0: Alcor Micro AU9540 00 00
Card state: Card inserted, Shared Mode,
ATR: 3B 7F 38 00 00 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00

ATR: 3B 7F 38 00 00 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00
+ TS = 3B --> Direct Convention
+ T0 = 7F, Y(1): 0111, K: 15 (historical bytes)
TA(1) = 38 --> Fi=744, Di=12, 62 cycles/ETU
64516 bits/s at 4 MHz, fMax for Fi = 8 MHz => 129032 bits/s
TB(1) = 00 --> VPP is not electrically connected
TC(1) = 00 --> Extra guard time: 0
+ Historical bytes: 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00
Category indicator byte: 00 (compact TLV data object)
Tag: 6, len: A (pre-issuing data)
Data: 44 4E 49 65 10 02 4C 34 01 13
Mandatory status indicator (3 last bytes)
LCS (life card cycle): 03 (Initialisation state)
SW: 9000 (Normal processing.)

Possibly identified card (using /usr/share/pcsc/smartcard_list.txt):
3B 7F 38 00 00 00 6A 44 4E 49 65 10 02 4C 34 01 13 03 90 00
3B 7F 38 00 00 00 6A 44 4E 49 65 [1,2]0 02 4C 34 01 13 03 90 00
DNI electronico (Spanish electronic ID card)
http://www.dnielectronico.es

If anyone has any ideas on further debugging, please let me know, as I'm not
sure where to take it next.
-- 
View this message in context: 
http://old.nabble.com/C_GetSlotList%28%29-returns-0-slots-in-Linux--tp34334480p34334480.html
Sent from the OpenSC - Dev mailing list archive at Nabble.com.

___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

[opensc-devel] Minidriver assume hexstring encoding for card serial number

2012-08-22 Thread Andreas Schwier (ML)
Hi everyone,

we've come across an issue with the minidriver which assumes the card
serial number to be a hex string.

In our card the serial number is a string composed of ASCII characters.
This works well with pkcs15-tool and the PKCS#11 library, however it
fails with the current minidriver when it tries to convert the hex
string into binary data for the cardid file.

Neither in PKCS#11 spec nor in ISO 7816-15 I can find a definition for
encoding the serial number as hex string.

I therefore propose to change the code in minidriver.c to do the following:

1. try parsing tokeninfo->serial_number as hex string
2. if that fails copy serial_number as is with the length being the
length of the ASCII encoded string

This should not interfere with current card drivers which all use a hex
string as serial number.

Any objections ?

Andreas

-- 

-CardContact Software & System Consulting
   |.##> <##.|   Andreas Schwier
   |#   #|   Schülerweg 38
   |#   #|   32429 Minden, Germany
   |'##> <##'|   Phone +49 171 8334920
-http://www.cardcontact.de
 http://www.tscons.de
 http://www.openscdp.org

___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel


Re: [opensc-devel] SOPIN and PUK in OpenSC

2012-08-22 Thread Jean-Michel Pouré - GOOZE
Le mercredi 22 août 2012 à 14:37 +0800, Grey0502 a écrit :
> I'm confused that while I run the CMD:
> pkcs15-init -C -p pkcs15 --pin 1234 --so-pin 123456
> I won't wanna store a PUK. it returned :
> Failed to create PKCS #15 meta structure: Security status not
> satisfied 

What is your token? OS?

Kind regards,
-- 
  Jean-Michel Pouré - Gooze - http://www.gooze.eu


smime.p7s
Description: S/MIME cryptographic signature
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Re: [opensc-devel] Supporting card Handelsbanken (SHB) BankID

2012-08-22 Thread Peter Stuge
Peter Åstrand wrote:
> proprietary "BankID" application

I suggest to try https://fribid.se/ out.


//Peter
___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

[opensc-devel] SOPIN and PUK in OpenSC

2012-08-22 Thread Grey0502
Hi,all
I'm confused that while I run the CMD:

pkcs15-init -C -p pkcs15 --pin 1234 --so-pin 123456

I won't wanna store a PUK. it returned :

Failed to create PKCS #15 meta structure: Security status not satisfied

and I run the CMD bellow without any errors:

pkcs15-init -C -p pkcs15 --pin 1234 --puk 123456 --so-pin 123456


Q:
1. Does it must contain a PUK in each smart card or a special 
manufacturer‘s card ?
2. Is it just related to the xx.profile file for each manufacturer in 
source code ?




___
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel