Go to file
2023-10-06 20:31:54 -05:00
.github/workflows update license headers to correct git repo 2023-10-04 12:21:18 -05:00
.vscode Add words to spell check dictionary 2023-10-05 19:14:30 -05:00
bin update license headers to correct git repo 2023-10-04 12:21:18 -05:00
sdks@e305a1a0b9 Update ant build for sdk submodule 2023-08-26 15:31:27 -05:00
src/dev/c0de/smartpgp fix typo 2023-10-06 20:31:54 -05:00
test_applet Update Applet Class path 2023-10-04 11:45:05 -05:00
.gitignore Hide venv and compiled python 2023-10-04 16:29:27 -05:00
.gitmodules Update ant build for sdk submodule 2023-08-26 15:31:27 -05:00
build.xml Reset card serial to 00000000 2023-10-04 19:19:10 -05:00
LICENSE.txt Rename License file 2023-10-04 12:33:16 -05:00
README.md Add a warning about ROCA 2023-10-04 15:30:08 -05:00

SmartPGP applet

SmartPGP is a free and open source implementation of the OpenPGP card 3.4 specification in JavaCard.

Features

The following features are implemented at the applet level, but some of them depend on underlying hardware support and available (non-)volatile memory resources:

  • RSA (>= 2048 bits modulus, 17 bits exponent) for signature, encryption and authentication
  • On-board key generation and external private key import
  • PIN codes (user, admin and resetting code) up to 127 characters each
  • Certificate up to 1 kB (DER encoded) for each key
  • Login, URL, and private DOs up to 256 bytes
  • Command and response chaining
  • AES 128/256 bits deciphering primitive

Warnings

ROCA

Infineon SLE78 chips are vulnerable to ROCA. This attack is only relevant if you used on-device key generation. It allows an adversary to obtain your private key, using only your public key.

There isn't much that can be done to rectify this, other than generating the private RSA keys off of your device and importing them. Other work arounds. (Using the OpenCrypto JCMathLib to handle the cryptographic functions may work too)

Use this tool to determine if your public keys are vulnerable.

Default values

The SmartPGP applet is configured with the following default values:

  • Admin PIN is 12345678
  • User PIN is 123456
  • No PUK (a.k.a. resetting code) is defined
  • RSA 2048 bits for PGP keys

These values can be changed by modifying the Constants class.

After the applet has been installed, the smartpgp-cli utility will be able to change the above values.

Note: These settings are restored if you factory reset the applet.

Note: If you change algorithm attributes, the key and corresponding certificate will be erased.

Build and Install instructions

Prerequisites

  • A Java compiler (No higher than OpenJDK 11 or equivalent)
  • A device compliant with JavaCard 3.0.1 (or above) with enough available resources
    • Applet: ~23 KiB of non-volatile (eeprom/flash) memory
    • Persistant Data: ~10 KiB of non-volatile (eeprom/flash) memory
    • Transient Data: ~2 KiB of volatile (RAM) memory

Importing RSA keys above 2048 bits

The internal buffer that stores keys is configured with a default value that is only large enough for RSA 2048 bit keys.

If your card is able to handle larger RSA key bit-lengths (3072 or 4096), and you want to import those keys, you will need to increase the buffer size.

This can be accomplished by modifying Constants.INTERNAL_BUFFER_MAX_LENGTH in Constants.java

RSA 2048 bit keys

When produced by OpenPGP, these keys are 949 Bytes in length.
Constants.INTERNAL_BUFFER_MAX_LENGTH may not be smaller than (short)0x3b6 (decimal: 950)

RSA 3072 bit keys

When produced by OpenPGP, these keys are 1294 Bytes in length.
Constants.INTERNAL_BUFFER_MAX_LENGTH may not be smaller than (short)0x50f (decimal: 1295)

RSA 4096 bit keys

When produced by OpenPGP, these keys are 1644 Bytes in length.
Constants.INTERNAL_BUFFER_MAX_LENGTH may not be smaller than (short)0x66d (decimal: 1645)

Reducing flash and/or RAM consumption

When the applet is installed, all data structures will be allocated to their maximum size. This is a standard practice for JavaCard applets to ensure that there will not be a memory allocation failure at runtime.

A consequence of this is that, if you configure a large rsa key and use a small key, that extra space can not be used for anything else.

If your device does not have enough flash memory and/or RAM, or you plan to not use some features (eg. on-device certificates), you can modify the following variables in Constants.java

  • Constants.INTERNAL_BUFFER_MAX_LENGTH: the size in bytes of the internal RAM buffer used for input/output chaining. Chaining is especially used in case of long commands and responses such as those involved in private key import and certificate import/export;

  • Constants.EXTENDED_CAPABILITIES, bytes 5 and 6: the maximum size in bytes of a certificate associated to a key. The default is 1152 Bytes. A certificate can be stored for each of the three keys.

Building the CAP file

  • (Optional) Edit the build.xml file and replace the APPLET_AID with your a unique value. Alternatively, set the right AID instance bytes during applet installation. Generate the AID using this tool

  • Execute ant to build SmartPGPApplet.cap

Installing the CAP file

The CAP file installation depends on your device, so you have to refer to the instructions given by your device manufacturer. Most open cards relying on Global Platform with default keys are supported by GlobalPlatformPro.

You must use a valid, unique AID that matches the OpenPGP card specification (see section 4.2.1) for each card (-create <AID> with GlobalPlatformPro)

Example Installation commands:

  • gp --install SmartPGPApplet.cap --default
  • gp --install SmartPGPApplet.cap --create <AID>