On 01/05/2011 12:50 PM, Nelson B Bolyard wrote:
> On 2011-01-03 13:04 PDT, Anders Rundgren wrote:
>> Hi,
>>
>> I'm in the starting phase upgrading Firefox so that it can provision
>> credentials in a way that that banks and governments require which
>> among many things include E2ES (End-to-End Security) and issuer-
>> specified PIN-codes (or just policies for user-defined dittos).
>>
>> The plan is mainly focusing on (enhanced) HW-tokens which NSS due
>> to its PKCS #11 heritage doesn't support with any of the above.
> I know a vendor of a product that includes tokens, pkcs#11 modules for
> Windows and Linux, and CA web site software, which product claims to have
> end-to-end (CA to token) security and (IIRC) Issuer-specified or issuer
> policy controlled PINs. 
Yes, sort of. The tokens can have multiple pins, but the PKCS #11 module
only exposes a single pin.
>  IINM, it is claimed that all communication with
> the token is done through the PKCS#11 module. 
Token provisioning is outside the PKCS #11 module. It uses global
platform secure channels to communicate to the card. The APDU's are
specific for the cards applet.
>  That vendor has at least
> one representative who participates occasionally here.  Perhaps he can
> speak to how that product accomplishes what it does, and/or correct my
> misperceptions about the product, Bob.
>


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to