Excuse me if I enter into this discussion. But, as the author of LSM-PKCS11,
I'd like to answer to the question:

     Why a daemon is required?

The aim of the package is to implement the necessary tools to build an
HSM-like device. 
Apart from tampering problems, an external machine implementing security
functions such as key-pairs creation and storing, signatures, cryptos and so
on, is a 'server': and a server is always implemented with background
processes dialoguing with a specific protocol and making something (i.e. a
service 'daemon').
Only with a daemon it is possible to break the client side (PKCS11 driver)
from the actual server side, leaving the daemon on the server. A simpler
solution is the inclusion of the service within the PKCS11 module itself,
but this would lead to a simple local software-emulation of a smart-card:
functionally correct, but very limited in use.
The client/server approach is open to both solutions: a stand-alone local
security device, and a network security module accessible from many clients
at the same time. 
Not a real HSM, but for a limited hardware budget of 200 dollars you get a
lite solution that can be logically tampered with proper security policies
and counter-measures. As we say in italian: "... e dimmi se e' poco..."
(tell me if this is nothing). 

Best Regards
Clizio Merli



Alon Bar-Lev wrote:
> 
> Hello Andreas,
> 
> Why a daemon is required?
> Can't the card transaction be used to sync between instances?
> And if caching is required you can cache certificates by thumbprint at
> user home...
> 
> Best Regards,
> Alon Bar-Lev.
> 
> On 3/6/07, Andreas Jellinghaus <[EMAIL PROTECTED]> wrote:
>> http://www.clizio.com/lsmpkcs11.html
>>
>> did anyone have a look at this software and try it?
>>
>> if it does what I think and if we could attach opensc to the
>> daemon side of it, then we might be able to to real locking etc,
>> and still have multi applications access a card - if the daemon
>> caches the certs etc.
>>
>> not sure if that idea works out, but might be worth a look.
>>
>> Regards, Andreas
>> _______________________________________________
>> opensc-devel mailing list
>> opensc-devel@lists.opensc-project.org
>> http://www.opensc-project.org/mailman/listinfo/opensc-devel
>>
> _______________________________________________
> opensc-devel mailing list
> opensc-devel@lists.opensc-project.org
> http://www.opensc-project.org/mailman/listinfo/opensc-devel
> 
> 

-- 
View this message in context: 
http://www.nabble.com/lsm-pkcs-11---tf3360425.html#a10125453
Sent from the OpenSC - Dev mailing list archive at Nabble.com.

_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to