On 28.2.2014 10:11, Petr Spacek wrote:
Proposal for access control related to PC/SC smart cards follows.
I have no idea if it applies to PKCS#11 or not but I think somebody
knowledgeable in this area should look into it ...
I'm sorry Honza :-)
Don't be, this seems to be related to PKCS#15 and PC/SC daemon only,
neither of which are we going to interact with whatsoever (correct me if
-------- Original Message --------
Subject: F21 System Wide Change: Access control in PCSC
Date: Thu, 27 Feb 2014 16:59:14 +0100
From: Jaroslav Reznik <jrez...@redhat.com>
Organization: Red Hat, Inc.
= Proposed System Wide Change: Access control in PCSC =
Change owner(s): Nikos Mavrogiannopoulos <n...@redhat.com>
Add access control to PC/SC smart cards available in the system. Adding
control would (a) prevent unauthorized processes/users from reading data
smart card, (b) prevent unauthorized processes/users from erasing a smart
card, (c) prevent unauthorized processes/users from talking to the smart
== Detailed Description ==
Add access control to PC/SC smart cards available in the system. Currently
smart cards may provide their own access control for certain elements of a
card such as a private key. Their access control method is typically a PIN,
but can also be a biometric based one. That however, is not sufficient to
prevent certain actions on the non-PIN protected elements. For example
that provide a PKCS #15 filesystem can be modified by anyone that has
the system (e.g., erased using pkcs15-init -E).
The default settings allowed should be similar to the default settings for
hard disks, i.e., root and the user in console should be able to access the
Adding access control would
* prevent unauthorized processes/users from reading data on a smart card
* prevent unauthorized processes/users from erasing a smart card
* prevent unauthorized processes/users from talking to the smart card
The way access control will be implemented is using polkit which is already
being used to control access to hard disks. As smart cards share a lot with
hard disks (e.g., a filesystem, and are inserted by the console user),
the same access control method is beneficial.
== Scope ==
polkit support has to be added to PC/SC daemon. An initial version has
been developed and communicated upstream
* Proposal owners: The polkit support has to be merged with the Fedora
package. That requires changes to the pcsc daemon only, but indirectly all
packages that potentially may use smart cards are affected (opensc,
* Other developers: Packages that use PC/SC smart cards must be checked
they work as expected after the access control change.
* Release engineering: No coordination is required.
* Policies and guidelines: If there is any security policy documentation
should be updated to include the new policies on smart cards (I couldn't
any such documentation though)
Freeipa-devel mailing list