Skip to content

Latest commit

 

History

History
68 lines (42 loc) · 2.94 KB

Feitian-ePass2003.md

File metadata and controls

68 lines (42 loc) · 2.94 KB

Feitian ePass2003

Feitian offers the ePass2003, a USB crypto token with high performance smart card chip and CCID interface.

The ePass2003 is the successor of the ePass PKI and the ePass3000, and was released to the public in December 2011. The ePass2003 relies on one single ST Microelectronics chip, designed in Europe with Common Criteria EAL 5+ certification. It weights only 6 gr and fits very well into a key ring with only 53 mm length, thus being one of the smallest tokens available to date.

The ePass2003 was designed for Free Software communities, especially the OpenSC community to provide a “universal” cryptographic token.

Feitian offers Windows CSP drivers and also provides Linux and Mac OS X drivers.

On the other hand, Feitian takes an active part in the development of OpenSC, offering a free software driver to the OpenSC community. The driver of ePass2003 in OpenSC is called “epass2003”.

This gives users the ability to use either proprietary or open-source software, which is the best to answer all needs. For example, under Windows7, drivers(Microsoft Minidriver) are distributed using Windows update, requiring no actions from users.

Links:

Setting up the token

The token can be set up using standard OpenSC tools, such as pkcs15-init. The token is using default transport keys (unless changed) so we can start with erasing the card:

$ pkcs15-init -E -T

After that we need to create the PKCS#15 filesystem and PINs:

$ pkcs15-init --create-pkcs15 -T -p pkcs15+onepin --pin 123456 --puk 12345678

To generate RSA key pair on the token:

$ pkcs15-init --generate-key rsa/2048 -l "RSA2k key" -a 01 -i 01 --so-pin 12345678 --pin 123456
$ pkcs15-init --generate-key rsa/2048 -l "RSA2k encryption key" -a 01 -i 02 --pin 123456 --key-usage decrypt

The newer tokens support also Elliptic curves. To generate a EC key, use the similar command:

$ pkcs15-init --generate-key ec/prime256v1 -a 01 -i 03 --pin 123456

The driver also supports loading existing keys to the token with the following command:

$ pkcs15-init --store-private-key rsa-key.pem -a 01 --key-usage sign,decrypt --pin 123456

FAQ

For users which get the error "Failed to erase card: Security status not satisfied" while erasing card, please download fix-tool from below. After running fix-tool as root, please do remove and re-plug the token/card.

Refer to issue #1803;

Links to the Fix_Tool.tar.gz archives:

Thanks

Big thanks to GOOZE and Feitian, for their technical help and donating hardware tokens.