On Thursday 15 February 2007 11:00 am, Andreas Jellinghaus wrote:
> Justin Karneges wrote:
> > There would appear to be a standard for #1.  I don't remember what it is
> > called, but it involves the ATR and then T=0 or 1 and friends.  However,
> > my experience with hacking on the Eutron driver showed that that either
> > there are still vendor-specific issues (bugs? workarounds?) to iron out,
> > or OpenCT is simply incomplete.
>
> only basic - some cards only have t=0, some have t=1. and due to
> restrictions in som readers that is real important. the commands have
> to be different dependend on the t=0/1 protocol in a few cases. and
> the commands are de-facto different for each card operating systems.
> or if the commands look the same, the metadata or the security model
> is different.
>
> and when you have a standard - like a national eid card - then every
> country has a different standard, so you are back to square one. the
> current reality is: plan to support many different card operationg systems.

Is the problem that these cards don't support 7816?

> > For #2 we have CCID.  This seems to be about the only thing we can count
> > on to work.  Can anyone correct me?
>
> the pinpad/display part of ccid was added in pcsc v2 part 10 and
> basically combines five different and incompatible methods into one
> standard. so at least pinpad/display is still a mess I think.

Multiple ways to do the same thing is not great, but if they are at least 
specified then it means interoperability can be achieved.

> and not all readers are ccid complient - new ones yes, but we still
> have lots of old hardware around.

As a user, I'm less concerned about old hardware, since smart cards have not 
touched the casual user market at all (you still cannot even go to a computer 
store and buy a usb token, at least not in the USA).  This means there is 
time for revision, and as a buyer I can stick to CCID-compliant readers only.

> and then there are ugly hacks. for example siemens cardos does not allow
> to have a key that can be used for signing and decryption at the same
> time. opensc has a "split-key" hack: create two keys with the same
> content, but present them as one. siemens itself uses a different hack:
> they "sign" with the decrypt function. so these normal use cases
> contain problems.

While a very ugly problem for writing, I hope this is transparent to 
read/use ?

> > Correct me if I'm wrong, but would ICCD count as a standard for both #1
> > and #2?  I'm confused about this, because if we already have a standard
> > for #1 (ATR, T=0, whatever), then it doesn't seem like we need the ICCD
> > spec at all. CCID would be enough.
>
> if it is what I think, it is only like ccid - even if the card inside
> the token is fixed and not flexible like in a ccid reader, and thus it
> can be a lot simpler, still each card is different, not all might have
> t=1 protocol, and the apdu commands (or data) is different for each
> card, too.

Not much of an improvement.  And that is what I don't understand about ICCD 
(maybe I should just read the document closer, heee).  It seems like you 
could already build a single chip usb token that advertised itself as a CCID 
reader with a single slot.  No need for ICCD.

> in theory there could be an iso 7816 card with no proprietory commands I
> guess, but I doubt there is one. I'm not even sure iso 7816 specifies
> everything usualy found in card manuals, e.g. the security model.

This seems to be the crux of the standardization problem: having enough 
standardized commands.  If there were enough for read/use (not write), that 
would be a good start...

-Justin
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to