Shawn Willden wrote:
On Tuesday 24 April 2007 02:28:21 pm Timothy J. Miller wrote:
This is only true if you're leaving the card in the reader.  I would say
don't do that; the card should only be inserted when the card is needed
for an operation, limiting the window during which malicious code can
piggyback an authenticated card session (or start its own).

Also keep in mind that pcscd accepts connections to the reader from any process on the machine. If there are any other users on your machine (using their own accounts), and the application doesn't open the card in exclusive mode and keep it open until you remove the card, then those other users can also use your card after you've authenticated to it.

To be safe, don't use a card with important private keys on a multi-user machine. Either that or be very sure that your applications grab the card and never let go once you've presented the PIN.


When I compiled pcscd and the other parts of the CAC access chain I did not tell them to be threaded, the result of this is, If a different app asks to use the card, the new application has to get the pin and authenticate to the card again, assuming I continue not messing up my pin entry often. Granted I am the admin of the box and can control such things on Pre FC6, unfortunately I suspect that on FC6 RedHat tried to help us out and compiled everything with threads.

I could be wrong, but I believe this would also have the effect of denying other users access to the signing/decrypting (i.e. private) credentials, plus I should notice something strange if the same application I just gave a pin to asks for it again.

It can be a little bit of a pain when reading email, authenticating to a web page _and_ using ssh[-agent], but I prefer being asked for my pin for each _different_ app that needs it. It made me aware that if my CAC is in, then connection to _ANY_ https site will cause the browser to send credentials (I wonder if the DoD intended IE to spew credentials everywhere from NMCI :), which reminds me to deny the pin for the card when I don't need to CAC the site.

Also, to use the CAC for accessing most of the Navy DoD resources (NMCI's OWA) from outside of the DoD physically controlled net (i.e. personal owned computer), I believe we are supposed to read and sign an agreement that specifies how we will control the computer we are using the CAC from/on. Making the same assumption that those who create that agreement, which is that those who signed it have read and will follow the agreement, the computer should be _reasonably_ secured.


--
Todd Denniston
Crane Division, Naval Surface Warfare Center (NSWC Crane)
Harnessing the Power of Technology for the Warfighter
_______________________________________________
Muscle mailing list
[email protected]
http://lists.drizzle.com/mailman/listinfo/muscle

Reply via email to