> -----Original Message-----
> From: Bob Relyea [mailto:[EMAIL PROTECTED]
> Sent: 23 January 2006 17:31
> To: [EMAIL PROTECTED]
> Cc: [email protected]
> Subject: Re: PKCS#11 module and FireFox password promting
>
>
> If the SSL site is not requesting client auth, then the prompts for your
> token pin during SSL may have to do with how the token was installed. If
> the token was installed as 'the default RSA device', then NSS assumes
> the token is a hardware accelerator and will try to use the token to
> verify RSA signatures and encrypt RSA keys.
>
> Try doing the following:
>    1. go to the Security Devices menu
> 'options->Advanced->security->security devices'.
>    2. Select the SaveSign Module ("It will say something like "SafeSign
> Module" and have a +/- twisty in front of it.
>    3. In the right hand window there should be a line labelled 'Path'.
> Copy that value (data following 'Path'). Note, the path may be quite
> long, and you may have to adjust the window to see the whole thing.
>    4. With the module selected click the 'Unload' button.
>    5. Click the load button, for 'Module Name' give "SafeSign Module",
> for 'Module filename' give the value you copied from Path in step 3.
>    6. click 'OK'.
>
> This should remove all the configuration bits set for your module. You
> will notice password prompts whenever NSS needs to look up certificates,
> but that should be restricted to SSL client auth sites and bringing up
> the certificate viewer.
>
Thanks for this Bob, unfortunately the behaviour still remains unchanged, as
soon as I go to the login page of my Yahoo account I get a smartcard PIN
request screen, which is strange as the Yahoo login is not even SSL.

I am not convinces the behaviour was the same with FireFox 1.07 so I'll try
to pop that back on another machine and see.

Thanks for you comments,
Mark.

> Mark Hobbs wrote:
> > I am currently using FireFox V1.5 (Windows XP) and use a smartcard based
> > DigitalID (private key and X509 cert) via a commercial PKCS#11
> DLL marketed
> > under the SafeSign name.
> >
> > My question concerns the frequency I am prompted for my
> smartcard password.
> > It appears that when FireFox tries to perform some SLL related action it
> > requires that I have an "active" smartcard session (e.g. I have recently
> > entered my PIN) despite the fact that for normal SLL, no client
> > authentication, there is no reason at all for it to need it.
> >
> > Surely this is not correct operation. It's certainly a pain.
> >
> > I have also noticed that when I use client authenticated SSL I am quite
> > rightly asked for my PIN but the internal caching of
> authentication tokens
> > appears to be different between the smartcard and the internal
> crypto device
> > as I am constantly asked to re-enter the smartcard PIN after periods of
> > inactivity (say 10 or 15 minutes).
> >
> The card module controls it's own login state. Some cards may have a
> timeout value built into them. By default, NSS does not have a timeout,
> though one can be set either globally or on a card basis. If NSS is
> enforcing this, the steps described above should reset the token to use
> the system default.
> > Probably not a fault as such but inconvenient.

Cheers, I'll try to contact the supplier to ask the question although using
the same card under IE with the companies CAPI CSP I don't get the time-out
"problem". Obviously CSP is different to PKCS11 although I would expect a
similar approach to time-outs for both.

> >
> > Regards,
> > Mark.
> >
> >
> >
> >
> > Diginis is an ISO 9001 certified company
> >
> >
> > Simple, Safe, Secure e-Solutions
> > This electronic transmission and any files attached to it are strictly
> > confidential and intended solely for the addressee. If you are not the
> > intended addressee, you must not disclose, copy or take any action in
> > reliance of this transmission. If you have received this transmission in
> > error, please notify us by return and delete the same. Although
> Diginus Ltd
> > rigorously endeavours to maintain a virus free computer environment, the
> > sender does not warrant that this transmission is virus-free
> and will not be
> > liable for any damages resulting from any virus transmitted.
> >
> >
> > _______________________________________________
> > dev-tech-crypto mailing list
> > [email protected]
> > https://lists.mozilla.org/listinfo/dev-tech-crypto
> >
>
>

_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to