Oh... It seems like I was not understood correctly... When I say Application I mean the result behavior for the user. Whether the application is using a middleware to achieve this or implement all by it-self is irrelevant to the end-result.
On Monday 27 November 2006 19:38, Martin Paljak wrote: > > 4. If the user removes the card from one reader and insert it to > > another reader, the application should detect that it is the same > > card, and not prompt the user for credentials again. > > Applications, the ones users are using, should not implement such > low level functionality. Applications should not know that such > things as smartcard readers exist at all (again - not all > applications, but the majority of *end-user* applications) True, if they use middleware... But the requirement still stands, look at it as QA requirement. > http://developer.apple.com/security/cdsaopenssl.html helps as well. > Basically operating systems should provide something that > applications can build upon (CDSA on mac, cryptoapi on windows, > upcoming QT thing on linux etc) and the only thing we should do is > to make sure that the given operating system services are good > enough and that opensc or other smartcard 'middleware' can > integrate nicely with the platform management system available > (tokend on mac is a good example :)) Well... I think Microsoft CryptoAPI lacks many features required for low level processing, like FORMAL way to know when smartcard is inserted, a way to enumerate objects on card, use of symmetric keys on external device, store previous (expired) certificates, data objects and more. > What I mean - we can't solve it all in applications, we only solve > it partially if we link all applications to a library, and in the > end - I still believe that pkcs#11 is a bad thing to expose to the > random joe out there. My father would never buy it. True, but unlike OpenSC API which is not standard, and CryptoAPI which misses functionality, PKCS#11 is good enough. I agree that it should not be exposed to end-users, and it is quite complex, so I've written the pkcs11-helper to help. Since PKCS#11 modules exists on *nix, win32, MacOS, I think that PKCS#11 enabled application has advantage over other interfaces. > Do you know about the 'pkcs11 directory' initiative by CAcert > people? http://wiki.cacert.org/wiki/Pkcs11TaskForce Yes. But this lacks the criteria I am talking about. I cannot say Mozilla *PKCS#11 CERTIFIED*... Since the end-user does not get what he expects. > Application developers should get a new level of understanding of > what the heck are keys and certificates and how should you approach > the field so that things like smartcards and keypads and so on > could be introduced with no modifications in their software. When > done right, an application could use smartcards, PCI cyrpto > accelerators and software keys all the same way - even if the HSM > interface is not pkcs11.... Well... You will have to implement a new middleware for this one, I just think it is easier to implement PKCS#11 provider for devices, than creating this generic middleware. > Anyway... great work on the pkcs11-helper thing and welcome! Thanks! Best Regards, Alon Bar-Lev. _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel