On Fri, Sep 25, 2015 at 11:52 AM, Erwann Abalea <eaba...@gmail.com> wrote:

> Bonjour,
>
> Le vendredi 25 septembre 2015 10:36:53 UTC+2, helpcrypto helpcrypto a
> écrit :
> > I hope you can find a solution for my problem, cause I can't. (And
> perhaps
> > it's impossible)
> >
> > Based on my knowledge of PKCS#11 standard, the spec is exposed to a MITM
> > attack that steals the PIN when an application invokes C_Login against a
> > PK#11 library.
>
> If a call to C_GetTokenInfo() returns the flag
> CKF_PROTECTED_AUTHENTICATION_PATH, then there's no PIN code to be sent in
> calls to C_Login(), C_SetPin(), C_InitToken(), etc. And the real
> authentication is device/vendor specific.
>

Sadly it doesn't.
The CryptoAPI middleware shows a window, but the PKCS#11 requires a PIN.


>
> > Of course my app could check pkcs#11 library checksum and other
> mechanisms
> > to "ensure" it is the library and not a proxy, but if my application is
> > opensource (I'll love to), I'm fu*ked.
> >
> > Is there any way to "trust" in the client? Can the server know the exe
> > being executed is MY exe and an EVIL copy? (A private key embebed can
> also
> > be cracked!)
> >
> > Furthermore, our *lovely* card sends APDU for login in plainText, so
> anyone
> > could see "1234" easily. And we are not able to establish a secure
> channel
> > cause we lack the required keys.
>
> And if you had the required keys, they would also be susceptible to theft,
> just as your previous private key.
>

I could store the keys on the server, making the application a dumb
repeater of crypted messages, not using PKCS#11 API but sending APDU to
card.
But....the provider (Gemalto) won't give the keys.(...wait a second, dind't
they were stolen? lol )



> > In the other hand, do you think is possible to "extend" WebcryptoAPI to
> > generate/use keys to/from browser or system keystore?
> > IMHO, how it actually works, sucks.
>
> Technically, it's possible. But it doesn't seem to be a shared goal.
> Anyway, this wouldn't solve your initial problem.
>

Although it won't solve my problem, this will make possible to kill
signature applets forever, which indeed it's my real objective.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to