In PKCS#15, there is discussion of offcard storage of certs, and the usage of cert "references". How does this map on PIV? Or, does it?

" 6.5.5    Certificate Directory Files (CDFs)
These elementary files can be regarded as directories of certificates known to the PKCS #15 application. They are optional, but at least one CDF must be present on an IC card which contains certificates (or references to certificates) known to the PKCS #15 application. They contain general certificate attributes such as labels, identifiers, etc. When a certificate contains a public key whose private key also resides on the card, the certificate and the private key must share the same identifier (this is indicated with a dashed-arrow in Figure 4). Furthermore, certificate directory files contain pointers to the certificates themselves. There can be any number of CDFs in a PKCS #15 DF, but it is anticipated that in the normal case there will only be one or two (one for trusted certificates and one which the cardholder may update). The certificates themselves may reside anywhere on the card (or even outside the card, see Section 8). The ASN.1 syntax for the contents of CDFs is described in Section 7.6."

Does PIV enforce the implied "normal" architecture of PKCS#15 - that card user (i.e. those denoted by the CHUID) cannot update/modify the set of "_trusted (root)_ certificates"?

In PIV, is there an acl controlling what cert values/refs the CHUID-denoted person can modify, or is the acl implied by the standard (and subject to conformance testing, as a critical-class SEF?)



From: "Peter Williams" <[EMAIL PROTECTED]>
Reply-To: MUSCLE  <[email protected]>
To: [email protected]
Subject: [Muscle] PKC#$15, GCs, PIV, musclecard architecture of VMs/FS
Date: Fri, 24 Mar 2006 04:29:58 -0800


 Douglas E. Engert  <[EMAIL PROTECTED]>
 Argonne National Laboratory
 9700 South Cass Avenue
 Argonne, Illinois  60439
 (630) 252-5444


Douglas,

Perhaps could you explain where I may be mis-understanding recent issues, on the PIV/PKCS#15 topic, on the list? The misunderstanding comes in respect ot PKCS$15 - which is a cross between a stream, and a "file _system_" defined over 7816-4 files (and their acls).

PKCS#15 is esseentialy a file system defined over the ISO 7816-4 files - MF/DF/EFs,m etc. V1.1 is obtained from ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-15/pkcs15v1.doc. The cited URL links to the document that was - apparently - the progenitor for ISO 7816-15 (drafts). But, what is the relationship formally of PKCS#15/7816-15 to PIV, and where can that info be seen in USG-issued _public_ documents?

If we reference muscle, we also know that musclecards come in a variety of card-types, for a common card-edge: the javacard ("VM"?) form of the muscle applet that Karsten has recently amended, and the ISO FS form sold by some vendors (apparently). The muscle download area has C-coded plugins for the two sets of wire format PDU encoders, bendath a common musclecard API - for the VM [aka javacard] applet, and the FS card. But the FS card does not export a PKCS#15 file system - it simply provides the muscle card-edge!

Is the PIV concept of a FS card type an extension of the muscle FS card concept? ... in which the card edge can not only be implemented in terms of classical 7816-4 file access/management instructions (READ/WRTIE BUFFER etc) but the collection of files MUST also conform to PKCS#15 (or 7816-15) - creating a "PKCS#15 filesystem"?

Now, finally, when discussing OpenSC, and its "PIV driver mode": can I assume that this host-side driver is willing to emulate the existance of a PKCS$15 complygin file system on a PIV card - even when the card only implements a VM type card edge?

How far could such an emulation go? for example, if one wanted to clone a card and thus get the source card to export the entire PKCS#15 ASN.1-defined BER stream, could the SC driver perform that "sttream" level of emulation, and then the reverse process...write a stream back to a set of GC instance(s) and their PIV-data containers - on a VM-style PIV card?

Peter.


_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle


_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to