2011/8/3 NdK <ndk.cla...@gmail.com>: > Il 03/08/2011 09:32, helpcrypto helpcrypto ha scritto: > I need to implement a multiuser web password manager that allows users > to group-share passwords (so Linux sysadmins don't have access to > Windows passwords -- yes, I know AD, it's just an example). > Server NEVER knows plaintext passwords, so even if it gets hacked no > sensitive information is disclosed. > Passwords must not be displayed, just gets copied to the clipboard (so I > can access firewall password even if I'm in a lab with a dozen users > behind my shoulders). As i understand, you want to develop like a wallte, where password stored on server (crypted) are copied to clipboard (altough a simply CTRL+V will display it), to let the user authenticate in toher services. Right? You need applets cause the access to this wallet is using smartcard? certificate? I agree, its the most "homogenic" way of doint it cross-browser
> Known bug in FF, IIUC. When you insert the card (or load opensc-pkcs11) > it C_Login to every slot even if you're not accessing certs. So: > 1) it asks for EVERY pin (even signature ones) Whats IIUC means? With our company card+spanish ID (dnie) on different readers, while doing client auth, it ask for 2 pins (one for each slot), to retrieve ALL the certs from all the slots/tokens. That, let FF to show a windows to select all possible certs. Is this the scenario you are pointing? Can you give me the bugzilla number? (From my experience, NSS or the part responsible from retrieving the certs its not very efficient...for example, it request like 150 times for vendor objects on my token, altough the first time i say "i have no one") I think we should exchange experiences :P > 2) while opensc-pkcs11 is loaded in FF, thunderbird (nor any other > PKCS11 'client') doesn't "see" the card Thats a opensc desired/undesired behaviour. If OpenSC did that for any reason, you could ask here (or martin). But i can tell you, its not FF the one who locks, cause my smartcard can be used and viewed by many at the same time. (Thanks god PCSC's BeginTransaction and EndTransaction methods) > Anyway, auth using 'internal' method is possible only on https sites > (unavailable on shared-hosting plans, and it's now giving me headaches > since I need to use SNI, that's not supported by IE on XP). No idea of what "internal" means, SNI, or what are you taliking about. >> Spanish tax ministry dont use Applets (use native componentes), >> which doesnt require the user to have java. > But, IIUC, that restricts use to only "supported" browser/platform -- I > have labs w/ Linux machines, workstations w/ Windows XP (some w/ only > IE, some w/ FF), quite a lot of Macs... The "minimum common denominator" > can be Java w/ a minimum of must-have native libs (like pcsc-lite and > ccid), even if it could be even better if those aren't needed. We have that 3 systems, and support for 3 major browser on each Firefox/Chrome/IE/Safari. I thinks thats neough for end users...come on, dont make me support "lynx" please. BTW, dont expect a friendly environment using Java on OSX, this guys hate them. Again, similar scenario, maybe we could exchange more info. >> https://www.agenciatributaria.gob.es/AEAT.sede/Inicio/Inicio.shtml >> Spanish ecofirma (also from gov) uses an applet that downloads a >> jnlp that install everything needed on your computer >> http://oficinavirtual.mityc.es/javawebstart/soc_info/ecofirma/index.html > This assumes that the user: > - can install sw Copying files its not always needed, but access to the system its. Signed applets will let you access the system, and you could whatever you want. > - usually uses only one machine Not true...it just "extract and run", even better that installing a client software. There are many ways to allow this without much headhache...and clean the temp files before shutting down :P I Agree its slower, but anyone could use it anywhere (desktop computer) > Well, I'm using Aventra cards, so they're both PKCS15 and cryptographic :) > I thougt you can't have "legally strong" signature unless you're using a > crypto card (at least here in Italy). According to our law (Spain), to have "the higher level of recognized sign, equivalent (and even more) to a hand made sign, you need a secure signing device (keypair generated inside the card)". This, for example, doesnt let the users export the key to a pkcs#12 file that could compromise the key. ---MAYBE IM WRONG ON THIS, so anyone can correct me and, please, do it if im wrong--- Anyway, the sing has legal value and its recognized as an advanced sign, the different can be resumed as: In case of trial, -recognized signatures (created using a secure signing device) are truthworthy unless the the opposite is proved ("defense should prove it") -advances signatures arent truthworthy unless can be proved ("prosecutor should prove it") > Sometimes I can't understand'em... Like for the support of DNS > extensions (commonly used by voip, jabber, Active Directory...) to tell > on which port is https listening... IIRC it's about 10 years that a > patch is available but never got adopted! Open source comunitties, my friend :) > If only SunPKCS11 would be more versatile... Maybe the simplest thing is > to get its source and hack it, so that it: > - supports plain on-card keypairs > - only asks PIN when needed AFAIK, both can be done. > - handles multiple slots What you mean with this? > - handles certs "outside a slot" (that is: that are not PIN protected) Add them to NSS (can have PIN protection), use a PKCS#12(can also have PIN protection)... Again, move this conversation to private if you consider so _______________________________________________ opensc-devel mailing list opensc-devel@lists.opensc-project.org http://www.opensc-project.org/mailman/listinfo/opensc-devel