Hi everyone, Ubuntu 10.04 LTS Beta 1 ("lucid") is now available on www.ubuntu.org. I did some testing already, and it seems to work fine for the apps I tested. More testing would be very welcome!
Also for those of you that want to test firefox with https client certificate authentication, I found out you can do that easily with openssl. See below for details. Regards, Andreas My testing so far: 1.) Version test Package OpenSC Ubuntu Lucid Enginge PKCS#11 0.1.8 0.1.8-2 Lib P11 0.2.7 0.2.7-1 OpenCT 0.6.20 0.6.19-1ubuntu3 OpenSC 0.11.13 0.11.12-1ubuntu2 Pam P11 0.1.5 0.1.5-1build1 Result: Versions ok, latest OpenCT/OpenSC changes with Rutoken S patch missing (but those were released quite late, so ok) 2.) Content check Pam P11 Looks OK Lib P11 HTML Documentation missing api.out missing in source tar.gz Engine PKCS#11 Looks OK OpenCT Looks OK OpenSC HTML Documentation (wiki) missing 3.) Function test Had to use VirtualBox Personal/Evaluation edition: * Virtmanager with KVM and USB devices didn't work out. * VirtualBox OSE doesn't include USB device support. Installed Ubuntu Lucid amd64 beta 1 Desktop (default installation). Installed dselect with "apt-get install dselect" In dselect installed all openct, opensc, libp11, pam-p11, engine-pkcs11 packages Added my user ("ubuntu") to group scard, logout, login again. Plugged in an token (Rainbow iKey 3000), assigned it to the guest VM Run "openct-tool list" -> found! Run "/etc/init.d/openct stop; /etc/init.d/openct start" Run "openct-tool list" again -> found! Testing with other tokens: * Rainbow iKey 3000 OK * Aladdin eToken PRO (4.2B) OK * GemPC KEY with Cryptoflex OK, but very slow * SCM SCR 335 OK -> Hotplugging seems to work fine. Wow, first Ubuntu release with that? 4.) Test by QuickStart (all tests only once, with an Aladdin eToken PRO 4.2B) Lets test the commands from each projects QuickStart documentation. OpenCT openct-tool list openct-tool atr OpenSC opensc-tool --list-readers opensc-tool --reader 0 --atr opensc-tool --reader 0 --name pkcs15-init --create-pkcs15 --so-pin 12345678 --so-puk 78907890 pkcs15-init --store-pin --auth-id 01 \ --label "Andreas Jellinghaus" \ --pin 123456 --puk 567890 --so-pin 12345678 pkcs15-init --generate-key rsa/2048 --auth-id 01 \ --pin 123456 --so-pin 12345678 openssl engine dynamic \ -pre SO_PATH:/usr/lib/engines/engine_pkcs11.so \ -pre ID:pkcs11 -pre LIST_ADD:1 -pre LOAD \ -pre MODULE_PATH:opensc-pkcs11.so \ -pre PIN:123456 req -engine pkcs11 -new -key id_45 -keyform engine \ -x509 -out cert.pem -text \ -subj "/CN=Andreas Jellinghaus" openssl verify -CAfile cert.pem cert.pem pkcs15-init --store-certificate cert.pem --auth-id 01 --id 45 \ --format pem --pin 123456 --so-pin 12345678 pkcs15-tool --dump pkcs11-tool --test --login --pin 123456 Libp11 - no special commands Engine PKCS#11 - already covered Pam P11 : pam_p11_opensc As root: modify pam config for su: auth required pam_p11_opensc.so /usr/lib/opensc-pkcs11.so And create a file with login information (still as root): mkdir ~/.eid chmod 0755 ~/.eid pkcs15-tool -r 45 > ~/.eid/authorized_certificates chmod 0644 ~/.eid/authorized_certificates Keep xterm as root open, so you can fix / undo things. Open a new xterm with Alt-F2 and try "su" from user to root. Pam P11 : pam_p11_openssh Pam config for "su: auth required pam_p11_openssh.so /usr/lib/opensc-pkcs11.so mkdir ~/.ssh chmod 0755 ~/.ssh ssh-keygen -D 0 > ~/.ssh/authorized_keys chmod 0644 ~/.ssh/authorized_keys OpenSSH not compiled with ssh support. Firefox Edit / Preferences / ... (load opensc-pkcs11.so as module) Setup a local https test server: openssl genrsa -out server.key 2048 openssl req -new -x509 -key server.pem -out server.pem \ -days 365 -subj "/CN=localhost" openssl s_server -accept 4443 -cert server.pem -key server.key \ -www -verify 99 The use firefox to surv to "https://localhost:4443/" Other applications wpa_supplicant - no test environment here strongswan - no test environment here thunderbird - no test environment here -> testing and feedback and test procedures welcome Cleanup pkcs15-init --erase-card --pin 123456 --so-pin 12345678 Card information for cardos cards cardos-tool --info Running the test suite (on empty cards) svn co http://www.opensc- project.org/svn/opensc/releases/opensc-0.11.13/src/tests/regression cd regression ./run-all --installed (on cryptoflex cards need a transport key specified, for example "-T" for the default one) _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel