Document toolboxDocument toolbox

OpenFIPS201 v1.10.0

Release Info

Release URL: Release OpenFIPS201 v1_10_0 ยท makinako/OpenFIPS201
Release Version: v1.10.0
Release Date: 4th Apr 2022
Release Hash: c5a58c8742e68d65cf21e9617d74643ca6b4d78771034e54ae5acb7648e81cfa (SHA256)

Release Signed By:
[makinako / Kim O'Sullivan (9615 7CC8 B90A 7709)]Keybase Profile: makinako on Keybase

ย 

Download Links

ย 

The latest revision of OpenFIPS201 is ready! Here are a few features and enhancements that have been added:

Documentation

  • Documentation relating to OpenFIPS201 has now been moved here to a public Confluence instance, as the docs were outgrowing the GitHub wiki.

  • Discussions has now been enabled, we welcome any feedback you have or let us know how you're using OpenFIPS201!

Dynamic Configuration

All FEATURE compilation constants are now gone and been replaced with a more extensive set of configuration registers for controlling aspects of applet behaviour. This means there is no longer a need to modify or build from source code in order to configure it.

All configuration elements can be updated either individually, or batched into a single command (using OPTIONAL ASN.1 elements). If you choose not to update the configuration, you can just use the default values that have all been defined to adhere to PIV, or if PIV doesn't specify something then sensible default values have been used.

Pre-Personalisation Interface

The PUT DATA ADMIN command has changed a bit due to dynamic configuration. The following BER-TLV structures are defined:

  • Create Data Object

  • Delete Data Object (Defined but not implemented)

  • Create Key Command

  • Delete Key (Defined but not implemented)

  • Update Configuration

  • Legacy Operation

Your current pre-perso will still work via the Legacy Operation, but you will not be able to take advantage of some of the extended features, notably dynamic configuration. We encourage you to migrate over to the new commands, which have been kept as similar as possible to ease the transition.

Bulk Pre-Personalisation

You can combine any number of the above pre-perso commands into the same APDU to reduce the command overheads of sending so many of them!

The command is identical to the normal PUT DATA ADMIN format, with the exception that you have an outer BER-TLV tag that contains a SEQUENCE OF individual commands.

You can also mix and match different kinds of updates in one (i.e. Keys, Data Objects and Config).

PIN Enhancements

The applet supports a number of additional useful enhancements to PIN functionality:

  • PIN Extended Length - You can define PIN lengths up to 16 digits in dynamic configuration

  • PIN Character Set - You can define PIN format requirements as either numeric, alpha numeric, alpha numeric (case insensitive) or raw (any byte value)

  • PIN History - You can configure the applet to remember up to the last 12 PIN values that were changed and prevent the user from re-using them.

  • PIN Complexity Rules - Two basic 'weak PIN' prevention rules have been added as optional parameters:

    • Sequence Rule - Allows you to prevent more than [n] consecutive digits from being used (for example, 123456).

    • Distinct Rule - Allows you to prevent more than [n] instances of the same character being used (for example, 111111).

  • PUK Retry Limits - PUK retries can now be defined in the same way PIN retries are (including separate counters for the Contact and Contactless interface). If the PUK is locked, it can only be unlocked by an administrative role over SCP03.

PIV Impacts

  • Setting the PIN Extended Length feature above 8 or below 6 will cause the padding/length to no longer comply with SP 800-73.

  • Setting the PIN Character Set to anything other than numeric will not work with any middleware that enforces numeric-only digits.

  • PIN History and Complexity Rules should be transparent and simply result in an error condition that should be handled by PIV middleware / clients.

Dynamic Admin Keys

For each data object and asymmetric key, you can now optionally define which symmetric key is responsible for managing it. This gives you the capacity to give write / key generation access to targeted objects. This feature is optional and if you do not specify an admin key, objects will default to the9B key.

PIV Impact: PIV defaults to the 9B key as the administrative key, so to maintain compatibility, simply define this key or don't specify the key.

User Manageable Data Objects

For asymmetric keys and data objects, it is possible to now add the User Admin access mode privilege. If this is set, the data object can be written to, or the key generated as long as the access conditions for that card have been met. This can be separated for contact / contactless and the special 'always' access mode may not be paired with this.

This has been included to permit the possibility of lower security applications whereby it is useful for regularly-changing operational data to be managed on the card without the requirement for administrative keys. Of course if the thought of this horrifies you, do nothing to your pre-perso scripts and the functionality will stay disabled.

Optional Cryptographic Mechanisms

The applet now attempts to instantiate all the required cryptographic mechanisms, but if there are any that it can't this now only results in those corresponding mechanisms being disabled, not prevention of the entire applet install.

PIV Impact: None, provided the card is able to support at least one of the asymmetric key pair types.

Other

  • The GlobalPlatform library now targets GP 2.2.1 instead of GP 2.1.1. This should not pose a problem for JC 3.0.4+ cards.

  • The Admin key attribute has now been deprecated as it replaced by the adminKey option

  • A Permit Mutual key attribute has been added for symmetric keys so it needs to be explicitly enabled. For legacy operations this attribute is automatically applied to maintain compatibility.

  • The discovery object is generated at run-time instead of applet compilation now, so you can change configuration parameters and it will reflect correctly.

  • FEATURE_STRICT_APDU_CHAINING has been removed as ISO7816 is pretty clear that you should be able to interrupt chained commands without an error.

  • FEATURE_DISCOVERY_OBJECT_DEFAULT has been removed now that the discovery object generates every call.

  • FEATURE_PIV_TEST_VECTORS has been removed as it's usefulness reduced with ECC support and FIPS 140 doesn't like test values.

  • The Options.restrictContactlessGlobalconfiguration parameter has been added, which will make the applet non-selectable over the contactless interface.

  • The Options.restrictContactlessAdmin configuration parameter has been added, which prevents SCP03 administration over contactless.

  • The Options.restrictSingleKey configuration parameter has been added, which will prevent the applet from allowing the same key to be defined with multiple mechanisms.

  • GET STATUS and GET VERSION are improved (more additions and improvements will follow in the coming months, but compatibility with the current response bytes will be maintained so don't hard-code length requirements into your code!).

  • Lots of other background changes, code review changes, etc.

ย 

Errata

Below is a list of known issues with this release

JIRA

Description

Status

Workaround

JIRA

Description

Status

Workaround

PinPolicy.RuleDistinct not enforced for CHANGE REFERENCE and RESET RETRY COUNTER

Fixed in v1.10.1

Disabling the distinct rule is only option for this release

GET STATUS prefixes tags with FF

Fixed in v1.10.1

Disregard the first FF byte of each tag in the GET STATUS response

GET VERSION command prefixes tags with FF

Fixed in v1.10.1

Disregard the first FF byte of each tag in the GET VERSION response