Jim Rees wrote:
> If I were doing it today, I'd give the card a usb interface, like
> etoken (or just use a usb token), and use some existing standards,
> maybe including tcp/ip, to talk to the card.

So maybe make it look like an USB ethernet device, and use IPv6.

While sounding a bit un-orthodox, it's an approach I have actually
seen on devices, and it has the benefit of reusing a software stack
that is very common in systems today: the network.

Anders, have you seen uIP, uIPv6 and maybe also Contiki, per Adam
Dunkels at SICS?

http://www.sics.se/~adam/uip/index.php/Main_Page
http://www.sics.se/contiki/contiki-6lowpan-uipv6-faq.html
http://www.sics.se/contiki/

Also:
http://www.shapeshifter.se/code/uipv6/
http://hackaday.com/tag/uipv6/


> 7816-3 is an abomination, it's just job security for bit-twiddlers.

I'm glad you say that.


> As for making the card speak something closer to pkcs11, that's not
> a bad idea, but a bit too special purpose for my taste.

One thing that may be worth mentioning is that USB devices can have
multiple interfaces active in parallel. There could be a new PKCS#11
over USB interface, and other interfaces alongside it, active at the
same time, driven by different software if desired. CCID could be
another interface, making the device backwards compatible with
existing smart card software stacks.

I like the PKCS#11 over USB idea!

I'm active in the libusb project, where we will shortly integrate
Windows support for libusb-1.0. Using that it would pretty much be
trivial to provide a single portable PKCS#11 driver for the device.

Another project to note is the open source PKCS#11 soft token called
SoftHSM by OpenDNSSEC folks: http://trac.opendnssec.org/wiki/SoftHSM

SQLite may be a bit much for smallish microcontrollers though.


> What about the biometric data from cac/piv?  What about
> symmetric-key systems like kerberos?  What about non-crypto apps
> like the phone book on your sim?  11 years ago we thought turning
> the card into a web server, and the services into web services,
> seemed like a good idea.  That might not be the right model, but I
> think it's useful to think of the card as a service provider, not
> just a secure store.

These are really valid questions!

Also, does it make sense for all these security providers to provide
their services always using one and the same method? I'm not sure it
will fit the requirements and desires of applications so well.


//Peter
_______________________________________________
opensc-devel mailing list
opensc-devel@lists.opensc-project.org
http://www.opensc-project.org/mailman/listinfo/opensc-devel

Reply via email to