]> git.proxmox.com Git - mirror_qemu.git/blame - docs/ccid.txt
Merge remote-tracking branch 'remotes/philmd/tags/integration-testing-20210927' into...
[mirror_qemu.git] / docs / ccid.txt
CommitLineData
6576b74b 1QEMU CCID Device Documentation.
1056c02b
AL
2
3Contents
41. USB CCID device
52. Building
63. Using ccid-card-emulated with hardware
74. Using ccid-card-emulated with certificates
85. Using ccid-card-passthru with client side hardware
96. Using ccid-card-passthru with client side certificates
107. Passthrough protocol scenario
118. libcacard
12
131. USB CCID device
14
15The USB CCID device is a USB device implementing the CCID specification, which
16lets one connect smart card readers that implement the same spec. For more
17information see the specification:
18
19 Universal Serial Bus
20 Device Class: Smart Card
21 CCID
22 Specification for
23 Integrated Circuit(s) Cards Interface Devices
24 Revision 1.1
25 April 22rd, 2005
26
e03ba136 27Smartcards are used for authentication, single sign on, decryption in
1056c02b
AL
28public/private schemes and digital signatures. A smartcard reader on the client
29cannot be used on a guest with simple usb passthrough since it will then not be
30available on the client, possibly locking the computer when it is "removed". On
31the other hand this device can let you use the smartcard on both the client and
32the guest machine. It is also possible to have a completely virtual smart card
33reader and smart card (i.e. not backed by a physical device) using this device.
34
352. Building
36
51f5c849
DB
37The cryptographic functions and access to the physical card is done via the
38libcacard library, whose development package must be installed prior to
39building QEMU:
1056c02b
AL
40
41In redhat/fedora:
51f5c849
DB
42 yum install libcacard-devel
43In ubuntu:
44 apt-get install libcacard-dev
1056c02b
AL
45
46Configuring and building:
47 ./configure --enable-smartcard && make
48
471f7e30 49
1056c02b
AL
503. Using ccid-card-emulated with hardware
51
52Assuming you have a working smartcard on the host with the current
51f5c849 53user, using libcacard, QEMU acts as another client using ccid-card-emulated:
1056c02b 54
5f32804c 55 qemu -usb -device usb-ccid -device ccid-card-emulated
1056c02b 56
1056c02b 57
471f7e30
PB
584. Using ccid-card-emulated with certificates stored in files
59
60You must create the CA and card certificates. This is a one time process.
61We use NSS certificates:
1056c02b 62
471f7e30
PB
63 mkdir fake-smartcard
64 cd fake-smartcard
65 certutil -N -d sql:$PWD
66 certutil -S -d sql:$PWD -s "CN=Fake Smart Card CA" -x -t TC,TC,TC -n fake-smartcard-ca
67 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe" -n id-cert -c fake-smartcard-ca
68 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe (signing)" --nsCertType smime -n signing-cert -c fake-smartcard-ca
69 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe (encryption)" --nsCertType sslClient -n encryption-cert -c fake-smartcard-ca
1056c02b
AL
70
71Note: you must have exactly three certificates.
72
471f7e30
PB
73You can use the emulated card type with the certificates backend:
74
75 qemu -usb -device usb-ccid -device ccid-card-emulated,backend=certificates,db=sql:$PWD,cert1=id-cert,cert2=signing-cert,cert3=encryption-cert
76
77To use the certificates in the guest, export the CA certificate:
78
79 certutil -L -r -d sql:$PWD -o fake-smartcard-ca.cer -n fake-smartcard-ca
80
81and import it in the guest:
82
83 certutil -A -d /etc/pki/nssdb -i fake-smartcard-ca.cer -t TC,TC,TC -n fake-smartcard-ca
84
85In a Linux guest you can then use the CoolKey PKCS #11 module to access
86the card:
87
88 certutil -d /etc/pki/nssdb -L -h all
89
90It will prompt you for the PIN (which is the password you assigned to the
91certificate database early on), and then show you all three certificates
92together with the manually imported CA cert:
93
94 Certificate Nickname Trust Attributes
95 fake-smartcard-ca CT,C,C
96 John Doe:CAC ID Certificate u,u,u
97 John Doe:CAC Email Signature Certificate u,u,u
98 John Doe:CAC Email Encryption Certificate u,u,u
99
100If this does not happen, CoolKey is not installed or not registered with
101NSS. Registration can be done from Firefox or the command line:
102
103 modutil -dbdir /etc/pki/nssdb -add "CAC Module" -libfile /usr/lib64/pkcs11/libcoolkeypk11.so
104 modutil -dbdir /etc/pki/nssdb -list
1056c02b 105
1056c02b
AL
106
1075. Using ccid-card-passthru with client side hardware
108
109on the host specify the ccid-card-passthru device with a suitable chardev:
110
c2387413
DB
111 qemu -chardev socket,server=on,host=0.0.0.0,port=2001,id=ccid,wait=off \
112 -usb -device usb-ccid -device ccid-card-passthru,chardev=ccid
1056c02b 113
471f7e30
PB
114on the client run vscclient, built when you built QEMU:
115
116 vscclient <qemu-host> 2001
117
1056c02b
AL
118
1196. Using ccid-card-passthru with client side certificates
120
471f7e30
PB
121This case is not particularly useful, but you can use it to debug
122your setup if #4 works but #5 does not.
123
124Follow instructions as per #4, except run QEMU and vscclient as follows:
125Run qemu as per #5, and run vscclient from the "fake-smartcard"
126directory as follows:
127
c2387413
DB
128 qemu -chardev socket,server=on,host=0.0.0.0,port=2001,id=ccid,wait=off \
129 -usb -device usb-ccid -device ccid-card-passthru,chardev=ccid
471f7e30 130 vscclient -e "db=\"sql:$PWD\" use_hw=no soft=(,Test,CAC,,id-cert,signing-cert,encryption-cert)" <qemu-host> 2001
1056c02b 131
1056c02b
AL
132
1337. Passthrough protocol scenario
134
135This is a typical interchange of messages when using the passthru card device.
136usb-ccid is a usb device. It defaults to an unattached usb device on startup.
137usb-ccid expects a chardev and expects the protocol defined in
138cac_card/vscard_common.h to be passed over that.
139The usb-ccid device can be in one of three modes:
140 * detached
141 * attached with no card
142 * attached with card
143
144A typical interchange is: (the arrow shows who started each exchange, it can be client
145originated or guest originated)
146
147client event | vscclient | passthru | usb-ccid | guest event
148----------------------------------------------------------------------------------------------
149 | VSC_Init | | |
150 | VSC_ReaderAdd | | attach |
151 | | | | sees new usb device.
152card inserted -> | | | |
153 | VSC_ATR | insert | insert | see new card
154 | | | |
155 | VSC_APDU | VSC_APDU | | <- guest sends APDU
156client<->physical | | | |
157card APDU exchange| | | |
158client response ->| VSC_APDU | VSC_APDU | | receive APDU response
159 ...
160 [APDU<->APDU repeats several times]
161 ...
162card removed -> | | | |
163 | VSC_CardRemove | remove | remove | card removed
164 ...
165 [(card insert, apdu's, card remove) repeat]
166 ...
167kill/quit | | | |
168 vscclient | | | |
169 | VSC_ReaderRemove | | detach |
170 | | | | usb device removed.
171
172
1738. libcacard
174
471f7e30
PB
175Both ccid-card-emulated and vscclient use libcacard as the card emulator.
176libcacard implements a completely virtual CAC (DoD standard for smart
177cards) compliant card and uses NSS to retrieve certificates and do
178any encryption. The backend can then be a real reader and card, or
179certificates stored in files.
1056c02b 180
471f7e30 181For documentation of the library see docs/libcacard.txt.
1056c02b 182