]> git.proxmox.com Git - mirror_qemu.git/blame - docs/ccid.txt
docs: update to show preferred boolean syntax for -vnc
[mirror_qemu.git] / docs / ccid.txt
CommitLineData
6576b74b 1QEMU CCID Device Documentation.
1056c02b
AL
2
3Contents
41. USB CCID device
52. Building
63. Using ccid-card-emulated with hardware
74. Using ccid-card-emulated with certificates
85. Using ccid-card-passthru with client side hardware
96. Using ccid-card-passthru with client side certificates
107. Passthrough protocol scenario
118. libcacard
12
131. USB CCID device
14
15The USB CCID device is a USB device implementing the CCID specification, which
16lets one connect smart card readers that implement the same spec. For more
17information see the specification:
18
19 Universal Serial Bus
20 Device Class: Smart Card
21 CCID
22 Specification for
23 Integrated Circuit(s) Cards Interface Devices
24 Revision 1.1
25 April 22rd, 2005
26
e03ba136 27Smartcards are used for authentication, single sign on, decryption in
1056c02b
AL
28public/private schemes and digital signatures. A smartcard reader on the client
29cannot be used on a guest with simple usb passthrough since it will then not be
30available on the client, possibly locking the computer when it is "removed". On
31the other hand this device can let you use the smartcard on both the client and
32the guest machine. It is also possible to have a completely virtual smart card
33reader and smart card (i.e. not backed by a physical device) using this device.
34
352. Building
36
37The cryptographic functions and access to the physical card is done via NSS.
38
39Installing NSS:
40
41In redhat/fedora:
42 yum install nss-devel
43In ubuntu/debian:
44 apt-get install libnss3-dev
45 (not tested on ubuntu)
46
47Configuring and building:
48 ./configure --enable-smartcard && make
49
471f7e30 50
1056c02b
AL
513. Using ccid-card-emulated with hardware
52
53Assuming you have a working smartcard on the host with the current
54user, using NSS, qemu acts as another NSS client using ccid-card-emulated:
55
5f32804c 56 qemu -usb -device usb-ccid -device ccid-card-emulated
1056c02b 57
1056c02b 58
471f7e30
PB
594. Using ccid-card-emulated with certificates stored in files
60
61You must create the CA and card certificates. This is a one time process.
62We use NSS certificates:
1056c02b 63
471f7e30
PB
64 mkdir fake-smartcard
65 cd fake-smartcard
66 certutil -N -d sql:$PWD
67 certutil -S -d sql:$PWD -s "CN=Fake Smart Card CA" -x -t TC,TC,TC -n fake-smartcard-ca
68 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe" -n id-cert -c fake-smartcard-ca
69 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe (signing)" --nsCertType smime -n signing-cert -c fake-smartcard-ca
70 certutil -S -d sql:$PWD -t ,, -s "CN=John Doe (encryption)" --nsCertType sslClient -n encryption-cert -c fake-smartcard-ca
1056c02b
AL
71
72Note: you must have exactly three certificates.
73
471f7e30
PB
74You can use the emulated card type with the certificates backend:
75
76 qemu -usb -device usb-ccid -device ccid-card-emulated,backend=certificates,db=sql:$PWD,cert1=id-cert,cert2=signing-cert,cert3=encryption-cert
77
78To use the certificates in the guest, export the CA certificate:
79
80 certutil -L -r -d sql:$PWD -o fake-smartcard-ca.cer -n fake-smartcard-ca
81
82and import it in the guest:
83
84 certutil -A -d /etc/pki/nssdb -i fake-smartcard-ca.cer -t TC,TC,TC -n fake-smartcard-ca
85
86In a Linux guest you can then use the CoolKey PKCS #11 module to access
87the card:
88
89 certutil -d /etc/pki/nssdb -L -h all
90
91It will prompt you for the PIN (which is the password you assigned to the
92certificate database early on), and then show you all three certificates
93together with the manually imported CA cert:
94
95 Certificate Nickname Trust Attributes
96 fake-smartcard-ca CT,C,C
97 John Doe:CAC ID Certificate u,u,u
98 John Doe:CAC Email Signature Certificate u,u,u
99 John Doe:CAC Email Encryption Certificate u,u,u
100
101If this does not happen, CoolKey is not installed or not registered with
102NSS. Registration can be done from Firefox or the command line:
103
104 modutil -dbdir /etc/pki/nssdb -add "CAC Module" -libfile /usr/lib64/pkcs11/libcoolkeypk11.so
105 modutil -dbdir /etc/pki/nssdb -list
1056c02b 106
1056c02b
AL
107
1085. Using ccid-card-passthru with client side hardware
109
110on the host specify the ccid-card-passthru device with a suitable chardev:
111
c2387413
DB
112 qemu -chardev socket,server=on,host=0.0.0.0,port=2001,id=ccid,wait=off \
113 -usb -device usb-ccid -device ccid-card-passthru,chardev=ccid
1056c02b 114
471f7e30
PB
115on the client run vscclient, built when you built QEMU:
116
117 vscclient <qemu-host> 2001
118
1056c02b
AL
119
1206. Using ccid-card-passthru with client side certificates
121
471f7e30
PB
122This case is not particularly useful, but you can use it to debug
123your setup if #4 works but #5 does not.
124
125Follow instructions as per #4, except run QEMU and vscclient as follows:
126Run qemu as per #5, and run vscclient from the "fake-smartcard"
127directory as follows:
128
c2387413
DB
129 qemu -chardev socket,server=on,host=0.0.0.0,port=2001,id=ccid,wait=off \
130 -usb -device usb-ccid -device ccid-card-passthru,chardev=ccid
471f7e30 131 vscclient -e "db=\"sql:$PWD\" use_hw=no soft=(,Test,CAC,,id-cert,signing-cert,encryption-cert)" <qemu-host> 2001
1056c02b 132
1056c02b
AL
133
1347. Passthrough protocol scenario
135
136This is a typical interchange of messages when using the passthru card device.
137usb-ccid is a usb device. It defaults to an unattached usb device on startup.
138usb-ccid expects a chardev and expects the protocol defined in
139cac_card/vscard_common.h to be passed over that.
140The usb-ccid device can be in one of three modes:
141 * detached
142 * attached with no card
143 * attached with card
144
145A typical interchange is: (the arrow shows who started each exchange, it can be client
146originated or guest originated)
147
148client event | vscclient | passthru | usb-ccid | guest event
149----------------------------------------------------------------------------------------------
150 | VSC_Init | | |
151 | VSC_ReaderAdd | | attach |
152 | | | | sees new usb device.
153card inserted -> | | | |
154 | VSC_ATR | insert | insert | see new card
155 | | | |
156 | VSC_APDU | VSC_APDU | | <- guest sends APDU
157client<->physical | | | |
158card APDU exchange| | | |
159client response ->| VSC_APDU | VSC_APDU | | receive APDU response
160 ...
161 [APDU<->APDU repeats several times]
162 ...
163card removed -> | | | |
164 | VSC_CardRemove | remove | remove | card removed
165 ...
166 [(card insert, apdu's, card remove) repeat]
167 ...
168kill/quit | | | |
169 vscclient | | | |
170 | VSC_ReaderRemove | | detach |
171 | | | | usb device removed.
172
173
1748. libcacard
175
471f7e30
PB
176Both ccid-card-emulated and vscclient use libcacard as the card emulator.
177libcacard implements a completely virtual CAC (DoD standard for smart
178cards) compliant card and uses NSS to retrieve certificates and do
179any encryption. The backend can then be a real reader and card, or
180certificates stored in files.
1056c02b 181
471f7e30 182For documentation of the library see docs/libcacard.txt.
1056c02b 183