On 23.03.2006, at 4:04, Shawn Willden wrote:
To clarify: Given that users will refuse to re-enter their PIN
hundreds of
times every day, using the approach mentioned by David Corcoran to
address
the multi-user access issue means that some higher-level mechanism
must be
implemented to cache the PIN so that each time the application
needs to
perform a PIN-protected operation it can re-present the PIN. If many
different user-level applications use the smart card, then it's
necessary to
either have each of them cache the PIN (requiring the user to enter
the PIN
once per application) or else create some sort of a PIN-caching
daemon which
they all connect to. More likely, it would become the smart card
interface
daemon. That's unwieldy and also requires the PIN to be kept
around in RAM
all the time, which is uncomfortable from a security perspective
(though not
fatal).
Another sidenote:
Many eID cards have to keys and thus two pins: one for
authentication, one for digital signature.
The card in .ee (800 000 cards handed out to folks) does it this way.
The authentication key requires a pin
only once and one can use the key untill you remove or reset the
card. Digital signature key requires a pin for every operation. This
is enforced on the card.
Then there are CSP-s, where as a CSP works much like a 'smart card
daemon'. Especially on OS X, where the CDSA subsystem uses a 'tokend'
daemon that is responsible for card communication, and is 'the
application'. Tokend talks to the CDSA subsystem that is responsible
for everything crypto on os x.
For cryptographic operations this is the right way, as applications
don't have to know from where exactly the signatures come from or
operations are done, they just 'talk to cdsa'
If you add a pinpad reader, it still works (though pinpad support on
os x does not exist currently, AFAIK)
as you enter your pin once for the authentication key when you insert
your card / access it for the first time,
the internal state of the card becomes 'authenticated' and CDSA takes
care of stuff like restricting access to the once authenticated card
to processes of only a single user and so on. No pin cache, you enter
a pin only once.
The concept of having applications talking directly to smartcards or
having to deal with 'smart card centric pkcs#11 issues' is, at least
for generic cryptocards and eID cards, IMHO a stupid design.
Of course, i can not talk about more compicated smartcard
applications and setups.
--
Martin Paljak / [EMAIL PROTECTED]
martin.paljak.pri.ee / ideelabor.ee
+372 515 64 95
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle