Erwann Abalea wrote:
On Wed, 6 Oct 2004, Jesse I Pollard - CONTRACTOR wrote:
On Wed, 6 Oct 2004, jmt wrote:
From: Jesse I Pollard - CONTRACTOR
Yes... this is the most delicate problem. I assume that you are
aware about how Mario Strasser's module checks the name. In your
opinion, what would be the best way to get the user name from the
card?
You can't.
Not really.
User names vary - on one system it might be based on the last name.
On another, the last name + first initial. And then what about the
case of multiple John Smith, or June Smith, Joe Smith, and
Josephine Smith?
Or it might be totally unrelated. I've seen user names like U77745
just because that was the policy at that site.
Even on the same system you may have multiple logins (I have two -
used for totally different purposes).
The only unique thing I've been told is an identification number at
the end of the CN string. It starts with a period, and is 10 digits
long. Maybe using that for a lookup of a list of valid login names
would be reasonable. Of course, the list of valid logins is NOT on
the card. And to get the identification number, you must have the
user supply the PIN.
My advice would be to do like others do: use an X.509 certificate,
and either: * do the Microsoft Way (tm) (see Q281245): add a
subjectAltName extension as otherName type, add an AVA with OID
1.3.6.1.4.1.311.20.2.3 (the 1.3.6.1.4.1.311 branch is owned by
Microsoft), encode the username (login name) as an UTF8 string, and
add the Smart Card Logon OID (1.3.6.1.4.1.311.20.2.2) in the
extendedKeyUsage extension, * do the LDAP way: in the subjectName of
the certificate, add an uniqueIdentifier (OID 2.5.4.45 - ISO X.500
branch), encode the login name as a DER IA5STRING, encode this DER
string as a BITSTRING, and place it as the value of the previous AVA,
* do your way: reserve an OID in the 1.3.6.1.4.1 (I have one, it's
free), add your own OID for this usage, and either use it as a new
AVA in the subjectName or subjectAltName or another totally new
extension.
This gets interesting, because it is moving towards ideas that a group
of us in the UK are putting forward (based on e-Europe Smart Cards work
at www.eeurope-smartcards.org: the OSCIE Vol 3 modelling exercise for
ID, authentication and signature using smart cards). The proposals use
X.509 certificates for ID (single assured identity), with attribute
certificates for add-on information such as alternative names, place of
residence, driving licence... a major aim is to allow common
infrastructure to handle many types of secure token. Handling login ID
and password is a downstream task once the core architecture is agreed.
How far this work will go is not yet known.
(Erwann: which country are you in?)
Peter
_______________________________________________
Muscle mailing list
[EMAIL PROTECTED]
http://lists.drizzle.com/mailman/listinfo/muscle