Douglas E. Engert wrote:
> I will have to try it with OpenSC.
> 
> On a related set of issues with smart cards for login...
> 
> Looking at man crytoadm, (and the MIT and OpenSC code and documents) it
> is not clear how access to a smart card can be restricted. I.E. How
> can access to the smart card (and reader) be limited to the user at
> the console? You don't want some ssh session accessing the console user's
> card...

cryptoadm isn't designed to solve that problem.  That is currently upto 
the PKCS#11 module (or PC/SC layers) that provides access to the card.

For example on Sun Ray there are many readers (at least one at each DTU 
possible multiple) and also potentially the one on the console too.  The 
way this is resolved is that the PC/SC and driver layer understands the 
Sun Ray architecture and only presents via PC/SC the readers connected 
to the users session.  For example if I have a Sun Ray 270 and an USB 
attached reader then I would see two slots via the OpenSC PKCS#11 
module.  If I move to a DTU that has only the built in card reader on 
the DTU then there would be only one slot.

> This has always been an issue with PKCS#11, as it is vague on what is
> a slot, and how a slot can be associated with a reader.

I thought that was always very clear.  A slot *is* a card reader and a 
token is a smartcard.  PKCS#11 v2.20 enhanced C_GetSlotList() so that it 
can be called again to find additional slots.  Only ones are never 
removed but may return errors.

> Then how does this relate to PCSC and its capability to work across the
> network?

I don't know anything about how PC/SC does that yet.

-- 
Darren J Moffat

Reply via email to