Re: [opensc-devel] Windows minidriver and Secure PIN Entry

2012-09-05 Thread Martin Paljak
On Thu, Sep 6, 2012 at 12:32 AM, Taylor, Tim wrote: > Is the opensc minidriver not able to detect and use the pinpad? At the moment, no. ___ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/op

Re: [opensc-devel] Windows minidriver and Secure PIN Entry

2012-09-05 Thread Douglas E. Engert
On 9/5/2012 4:32 PM, Taylor, Tim wrote: > I have installed the drivers from HID Global for this reader. > > The same reader device driver will be used regardless of whether the > PKCS#11 module, or the minidriver is used to interact with the Smart > Card, right? > > And as I mentioned when I use

Re: [opensc-devel] Windows minidriver and Secure PIN Entry

2012-09-05 Thread Taylor, Tim
I have installed the drivers from HID Global for this reader. The same reader device driver will be used regardless of whether the PKCS#11 module, or the minidriver is used to interact with the Smart Card, right? And as I mentioned when I use the PCKS#11 driver, I'm prompted to enter my pin on th

Re: [opensc-devel] Two back-to-back runs, different results

2012-09-05 Thread Douglas E. Engert
On 9/5/2012 12:48 PM, Scott Michel wrote: > I am trying to debug an issue with the SCM 311 reader and Oberthur ID One > card in order to better support Macs and smart card-enabled sites. I've been > using pkcs15-tool to list certificates on the card. The result is that on the > first run with

[opensc-devel] Two back-to-back runs, different results

2012-09-05 Thread Scott Michel
I am trying to debug an issue with the SCM 311 reader and Oberthur ID One card in order to better support Macs and smart card-enabled sites. I've been using pkcs15-tool to list certificates on the card. The result is that on the first run with the card inserted for the first time, certificates a

Re: [opensc-devel] SafeNet/Aladdin new eToken PRO (Java) - driver

2012-09-05 Thread Martin Paljak
Hello On Tue, Sep 4, 2012 at 3:19 PM, Martin Čmelík wrote: > Hi Peter, > > oh, really? > I was playing with that 5 hours. Seems that I maybe somehow ruined > official SafeNet libraries (but auth client works fine...). > One more note: I'm using it on Mac OS > Can you send me please your openssl a

Re: [opensc-devel] Unsing engine_pks11 with openssl-fips 2.0

2012-09-05 Thread Martin Paljak
Hello, On Mon, Aug 13, 2012 at 1:41 AM, Douglas E. Engert wrote: > I don't anything in this, other then it looks like it never called > OpenSC. > > OpenSC is compiled with OpenSSL, and it could be conflicts > with two different versions of OpenSSL. > > ldd /usr/lib/engines/engine_pkcs11.so > woul

Re: [opensc-devel] SafeNet/Aladdin new eToken PRO (Java) - driver

2012-09-05 Thread Peter Bowen
I'm using it on Linux, but all I had to do was: pkcs11-tool --module libeToken.so.8 -l -O I don't know what the equivalent is on Mac OS X. Thanks, Peter On Tue, Sep 4, 2012 at 5:19 AM, Martin Čmelík wrote: > Hi Peter, > > oh, really? > I was playing with that 5 hours. Seems that I maybe someho

Re: [opensc-devel] Supporting card Handelsbanken (SHB) BankID

2012-09-05 Thread Martin Paljak
Hello, On Tue, Aug 21, 2012 at 2:03 PM, Peter Åstrand wrote: > > Hi! It would be nice if OpenSC could support cards from the Swedish bank > "Handelsbanken" (SHB). This is a BankID type of cards. I've tried multiple > versions of OpenSC and they all fail to communicate with the card, with one > exc

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread NdK
Il 05/09/2012 13:29, helpcrypto helpcrypto ha scritto: > The most advanced i have seen here so far is 2048 :P I bought (but haven't yet had time to experiment with) Cryptomate64: http://www.acs.com.hk/index.php?pid=product&prod_sections=0&id=CRYPTOMATE64 See my message dated 2012/05/23. Doesn't

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread helpcrypto helpcrypto
> Do you want my Humble or Honest opinion ? :) None. Hacker one :P > It shall depend on the use case. I doubt that there will ever be a > "single, universal keychain", but many. VPN authentication with device > based (TMP etc) keys which get auto-provisioned and a "movable" > identity in the form

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread Martin Paljak
On Wed, Sep 5, 2012 at 2:29 PM, helpcrypto helpcrypto wrote: >> And IMHO device-attached containers (TPM, Intel etc) are totally >> different from transportable key-containers (like smart cards or USB >> tokens) > > So, IYHO, whats the better option? Do you want my Humble or Honest opinion ? :)

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread Anders Rundgren
On 2012-09-05 13:29, helpcrypto helpcrypto wrote: >> Huh, I'd guess (hope) nobody would be deploying *RSA* below 2048 bits >> (smart cards doing 3k and 4k are also slowly emerging) and elliptic >> curves are already becoming a viable option (in commodity software) as >> well.. > > The most advance

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread J.Witvliet
-Original Message- From: opensc-devel-boun...@lists.opensc-project.org [mailto:opensc-devel-boun...@lists.opensc-project.org] On Behalf Of helpcrypto helpcrypto Sent: Wednesday, September 05, 2012 1:29 PM To: opensc-devel@lists.opensc-project.org Subject: Re: [opensc-devel] Secure Crede

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread helpcrypto helpcrypto
> Huh, I'd guess (hope) nobody would be deploying *RSA* below 2048 bits > (smart cards doing 3k and 4k are also slowly emerging) and elliptic > curves are already becoming a viable option (in commodity software) as > well.. The most advanced i have seen here so far is 2048 :P > There's also a bun

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread Martin Paljak
On Wed, Sep 5, 2012 at 12:57 PM, helpcrypto helpcrypto wrote: > Also, considering how governments are involved in technology, probably > many countries will adopt them, like eID, DNIe, and so in the next > years. > In 1024bit mode, of course. Huh, I'd guess (hope) nobody would be deploying *RSA*

Re: [opensc-devel] Secure Credential Cloning. Was: Intel's Virtual Smart Card

2012-09-05 Thread helpcrypto helpcrypto
Just to sum up: -TPM (fail?) -Intel IPT (seem to be a draft and only for intel?) -SC (Welcome 1970) -Virtual/Cloud wallets (obscure?) -A mobile device to replace sc (standard?) IMHO, SC are old enough/well known to continue existing for quite long, until someone brings a new/better/big idea. Also