Martin Paljak wrote, On 2008-12-10 03:50:
> On 10.12.2008, at 8:08, Nelson Bolyard wrote:
>> Robert Relyea wrote:
>>> Martin Paljak wrote:
>>>> Thanks for tips! Could you point me to the line in spec where it 
>>>> says that slots can only be added. I cant  find the place where it
>>>> forbids removing.
>>>> 
>>> That's what I get for not checking the spec after the meeting in 
>>> which we discussed this. The original agreement was that removal was 
>>> forbidden. Unfortunately the current spec does not forbid removing 
>>> slots.
>>
>> Bob, as you may know, the PKCS#11 working group will be meeting by 
>> telephone Thursday morning at 6 AM Pacific Time.  This seems like a
>> good issue to raise in that call.  SEED will also be discussed in that
>> call.
>
> What kind of working group? Mozilla centric or some generic? If there is
> anything else I could provide before that time or clarifications needed,
> let me know. If it is a "public" meeting I could as well call too if
> required.

The PKCS standards are published by RSA laboratories, but they are
products of their respective working groups.  There are two working
groups for PKCS standards, one specific to PKCS#11 (named "cryptoki"),
and one that covers all other PKCS standards (named PKCS-TNG).
For some PKCS standards, when the standard is published, its working
group becomes inactive, and ceases to function separately and any further
discussion of that standard takes places in the general PKCS-TNG list.
The one working group that has been active in an on-going fashion for
long (about a decade now) is the cryptoki group.  They mostly communicate
by email through the working group's mailing list, but they occasionally
(rarely) have "work shops" and/or conference calls.  One such event will
be tomorrow.

More information about these subjects may be found at
http://www.rsa.com/rsalabs/node.asp?id=2143

Discussions in the cryptoki mailing list is very strictly limited to
discussion of potential revisions or additions to the standard.
No other general discussion of cryptography or security is allowed.

>>> Firefox does not allow removal. It'll be a small change to the code
>>> to handle  removal, though it makes the slot checks more expensive.
>>> If you could write a bug up I'd appreciate it.
>> I don't recall the details now, but as I recall, there was some nasty 
>> problem with shrinking sets of slots.  I think it was simply that if 
>> the module can shrink it while it is in use, it may cause the code
>> outside the module to reference a stale pointer.  Something like that. 
>> Do you recall the particulars?
> 
> How many slots does FF/NSS support 

It's dynamic.  No fixed limit.  But presently, the list may only grow,
not shrink.

> (if I need to add new slots with every different reader for 2 days, when
> will I run out of slots..)

I think you're talking about a common implementation where the token and
reader are one and the same, and the act of connecting the token also
connects a new reader.  One way to implement that in PKCS#11 is to add a
slot for every reader.  But I don't know of ANY implementation that
actually works that way.  The more common approach, used by MANY vendors,
is to re-use slots.  When a reader is removed, the slot simply shows as
having the token removed.  The slot never disappears during the lifetime
of that process.  When a different reader is connected, it reuses an
existing slot that previously showed an absent token, unless all slots
are in use, in which case it adds a new slot.

IMO, that it definitely the preferred way to handle such removable readers.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to