From 23ac9f57b9b4c761cb8edc5bfa0c0de77ec89326 Mon Sep 17 00:00:00 2001 From: Silvio Rhatto Date: Sat, 30 Sep 2017 14:06:22 -0300 Subject: Change extension to .md --- research/token.md | 47 +++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 research/token.md (limited to 'research/token.md') diff --git a/research/token.md b/research/token.md new file mode 100644 index 0000000..2443074 --- /dev/null +++ b/research/token.md @@ -0,0 +1,47 @@ +[[!meta title="Tokens USB"]] + +## Gnuk + +* [Free Software Initiative of Japan - gnuk](http://www.fsij.org/category/gnuk.html) +* [Gnuk Documentation — Gnuk Documentation 1.0 documentation](http://www.fsij.org/doc-gnuk/) +* [Gnuk - Noisebridge](https://noisebridge.net/wiki/Gnuk). +* [FST-01 - Seeed Wiki](http://wiki.seeed.cc/FST-01/). +* [Questions - FST-01 Q&A Forum](http://no-passwd.net/askbot/questions/). +* Threat modeling: + * [How safe is Gnuk against side channel attacks, USB sniffer, or electron/tunneling microscope? - FST-01 Q&A Forum](http://no-passwd.net/askbot/question/33/how-safe-is-gnuk-against-side-channel-attacks-usb/). + * [How does Gnuk protect against attacks to extract private keys? - FST-01 Q&A Forum](http://no-passwd.net/askbot/question/32/how-does-gnuk-protect-against-attacks-to-extract/). + * [What types of risk are more likely? What's "best practice" against that? - FST-01 Q&A Forum](http://no-passwd.net/askbot/question/68/what-types-of-risk-are-more-likely-whats-best/). + +## Safenet eToken E5110 + +No Debian, instale o [MUSCLE](https://pcsclite.alioth.debian.org/): + + sudo apt install libccid pcsc-tools pcscd pcscd libpcsclite1 + +Plugue a parada e execute: + + opensc-tool --list-readers + +## SafeNet Authentication Client + +Para uso no mundo corporativo e institucional, como OAB e afins. Você não vai +querer usar os drivers proprietários a não ser que seja forçado, certo? + +Curioso que no fim das contas a OAB conseguiu seu lugar ao sol no mercado +da certificação digital apesar da implantação do modelo governamental escolhido +para o certificado raíz brasileiro, história contada no livro [Leviatã Eletrônico](http://www.scielo.br/scielo.php?script=sci_arttext&pid=S1517-45222010000300013). + +Enfim, pra usar o eToken E5110 pra assinar documentos no navegador você +precisará de drivers específicos e proprietários. + +Aparentemente a [Gemalto comprou a SafeNet]http://www.gemalto.com/press/Pages/Gemalto-to-acquire-SafeNet,the-worldwide-leader-in-data-and-software-protection.aspx) e depois ficou muito mais difícil para baixar o driver do eToken E5110, que além de ser proprietário ainda ficou privativo! Maluco fez [até script](https://gist.github.com/dex4er/1354710) pra automatizar essa zica. [Aqui](https://site.solutinet.com.br/2015/manuais/instaladores/) há versões recentes das bibliotecas e do cliente de autenticação proprietário (dica [daqui](https://diadialinux.wordpress.com/2017/03/02/instalar-etoken-alladin-usar-sites-do-governo-com-certificado-digital-e-assinar-documentos-pdf/)). + +Referêcias: + +* [Token-Based Authentication | SafeNet eToken 5110 USB Authenticator](https://safenet.gemalto.com/multi-factor-authentication/authenticators/pki-usb-authentication/etoken-5110-usb-token/) +* [Guia](http://poddarprofessional.com/demo/DIGITAL%20SIGNATURE/UTILITIES/E-token%20Drivers%20For%20LINUX/eToken_PKI_Client_Linux_4_55_Reference_Guide.pdf). +* [eToken Pro 72k and Linux - r3blog](https://r3blog.nl/index.php/etoken-pro-72k/). + +## Misc + +* [ImperialViolet - Security Keys](https://www.imperialviolet.org/2017/08/13/securitykeys.html). -- cgit v1.2.3