[1146] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Is PKCS#11 broken, or is it just me?

daemon@ATHENA.MIT.EDU (Marcus Leech)
Wed Jul 2 15:54:58 1997

From: "Marcus Leech" <mleech@nortel.ca>
To: cryptography@c2.net
Date: Wed, 2 Jul 1997 14:29:48 -0500 (EDT)

I've been looking over the PKCS#11 V2.0 document, and I've come to the
  conclusion that it's broken.

My understanding of the way it works is that the user "logs in" to the
  card, using a PIN, and acquires a "session".  The card, therefore, is
  stateful, and presumably any process that can then get to the card
  can cause it to do useful things (sign documents, decrypt files, etc).

If I were designing the interface, I'd insist that all transactions that
  would need access to private-key storage in the "cryptographic module"
  require a passphrase, that is used to generate the key that was used to
  encrypt the private key.  In this model, the "attacker" who is able
  to gain access to the card (too-liberal permission on /dev/smartcard, for
  example) would still be unable to do anything useful with it; they'd
  need to be able to snarf the passphrase as well.

In reality, do implementors of PKCS#11 use the "PIN" as a passphrase,
  and thus have the private key "in the clear" for the duration of a
  login?

On a related note--does anyone have a public-domain PKCS-11 implementation
  that I can play with?

-- 
----------------------------------------------------------------------
Marcus Leech                             Mail:   Dept 8M86, MS 012, FITZ
Systems Security Architect               Phone: (ESN) 393-9145  +1 613 763 9145
Messaging and Security Infrastructure    Fax:   (ESN) 395-1407  +1 613 765 1407
Nortel Technology              mleech@nortel.ca
-----------------Expressed opinions are my own, not my employer's------

home help back first fref pref prev next nref lref last post