OpenSC
eid-mw
Our great sponsors
OpenSC | eid-mw | |
---|---|---|
8 | 1 | |
2,413 | 190 | |
1.9% | 1.1% | |
9.6 | 7.9 | |
5 days ago | 4 days ago | |
C | C | |
GNU Lesser General Public License v3.0 only | GNU Lesser General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
OpenSC
- How do you put your private key files (.ppk) on a security key (HYPERFIDO U2F/FIDO2/HOTP) ?
-
Create Your Own Local Root CA With Yubikey Signing
This installs opensc, a library for dealing with Smart Card (essentially what a Yubikey is recognized as) access in a programmatic way. It also installs OpenSSL bindings that interact using the pkcs11 standard. Basically, we won't get very far using a Yubikey for signing without this. The intermediate CA configuration will also need to be updated:
-
You can link an OpenPGP key to a German eID
Well, in Spain you can use your eID directly: https://github.com/OpenSC/OpenSC/wiki/DNIe-%28OpenDNIe%29#up...
-
Enhance your Network Security with Zero Trust and OTP
The OpenSC binary to interact with the Yubikey at command line.
-
Tillitis Security Key – Mullvad spin-off inspired by measured boot and DICE
https://github.com/OpenSC/OpenSC
Note that "production ready" does not equate to "follow a YouTube video and write 17 lines of TypeScript." You need to know Java, you need to know crypto, and you need a few bucks to throw at the appropriate hardware. That said, the entire US DoD is built on JavaCard so it is as production grade as you can get.
-
EU Commission to open source software
Next step. Make sure EU Government paid contractors release source code per LGPL https://github.com/OpenSC/OpenSC/issues/2462
-
How do you store private keys?
I have one of the Nitrokeys and several of the smart cards for various purposes. The software side of using them can be a bit confusing if you're not familiar with HSMs and PKCS#11, but the OpenSC project has a lot of good info to help.
-
Dev Tools I Can't Appreciate Enough
1- PKCS11-Tools by OpenSC
eid-mw
-
Reading id card
I'm not sure if that's even possible, the system works through proprietary middleware, and that would require you to implement their SDK. See https://github.com/Fedict/eid-mw/tree/master/doc/sdk/documentation
What are some alternatives?
AusweisApp - Der offizielle eID-Client des Bundes.
mod_auth_openidc - OpenID Certified™ OpenID Connect Relying Party implementation for Apache HTTP Server 2.x [Moved to: https://github.com/OpenIDC/mod_auth_openidc]
tpm2-pkcs11 - A PKCS#11 interface for TPM2 hardware
putty-cac - Windows Secure Shell Client With Support For Smart Cards, Certificates, & FIDO Keys
yubico-piv-tool - Command line tool for the YubiKey PIV application
yubikey-full-disk-encryption - Use YubiKey to unlock a LUKS partition
postman-app-support - Postman is an API platform for building and using APIs. Postman simplifies each step of the API lifecycle and streamlines collaboration so you can create better APIs—faster.
GlobalPlatformPro - 🌐 🔐 Manage applets and keys on JavaCard-s like a pro (via command line or from your Java project)
nvm - Node Version Manager - POSIX-compliant bash script to manage multiple active node.js versions