It's a fact that the 'izenpe' token is the one that's causing Firefox to lock 
the NSS files.
It is a pkcs#11 module based on opensc drivers.

I've tested shareable NSS with a JSS-based program, watching the opensc logs, 
and the pkcs#11 module gets the smartcard locked and unlocked atomically for 
each certificate query operation.

Conversely, when the pkcs#11 module gets started via Firefox the pkcs#11 module 
locks the smartcard until the browser is closed, disabling any concurrent 
access to the NSS certificates, so as making it non-shareable.

Initially the pkcs#11 token session does not get started when opening Firefox. 
It gets started manually starting / terminating the session through the PSM 
manager, or and this is IMHO the worst case, while surfing an SSL client-based 
authentication where the certificate it's stored in the smartcard.

This behaviour is informed in the opensc configuration file
<pre>
                # By default, the OpenSC PKCS#11 module will
                # try to lock this card once you have authenticated
                # to the card via C_Login. This is done so that no
                # other user can connect to the card and perform
                # crypto operations (which may be possible because
                # you have already authenticated with the card).
                #
                # However, this also means that no other application
                # that _you_ run can use the card until your application
                # has done a C_Logout or C_Finalize. In the case of
                # Netscape or Mozilla, this does not happen until
                # you exit the browser.
                # Default: false
                #lock_login = false;
</pre>

____

Is there any information I could read about why the PSM locks the driver until 
exit, instead of making an atomic needy use of it?

Thanks in advance,

Irune :: Zylk.net


----- Mensaje original -----
De: "Wan-Teh Chang" <w...@google.com>
Para: "mozilla's crypto code discussion list" 
<dev-tech-crypto@lists.mozilla.org>
Enviados: Jueves, 13 de Enero 2011 3:32:43
Asunto: Re: Firefox PSM locks NSS

On Tue, Jan 11, 2011 at 4:48 AM, Irune Prado Alberdi <ipr...@zylk.net> wrote:
>
> While if I terminate the pkcs11 session in firefox I can successfully acces 
> the token
> <pre>
> $ certutil -d sql:. -K -h izenpe
> certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects"
> certutil: no keys found
> certutil: Checking token "NSS Generic Crypto Services" in slot "NSS Internal 
> Cryptographic Services"
> certutil: no keys found
> certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key 
> and Certificate Services"
> certutil: no keys found
> certutil: Checking token "IZENPE" in slot "Gemplus GemPC Twin 00 00"
> Enter Password or Pin for "IZENPE":
> < 0> rsa      ad22bafb47cd03a443e7777e3c04e4914f5cc52a   PRUEBAS EFACTUR
> </pre>

Perhaps it's the "IZENPE" token, not the NSS sqlite3 DB, that blocks certutil.

The first slot, "NSS Builtin Objects", doesn't use sqlite3, so this
shows a later slot can block certutil from output anything.  So any
later slot, not just the NSS DB slot, could be the cause of the
blocking.

Wan-Teh
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to