Etoken Pro 72k Driver Linux

  суббота 14 марта
      10

Currently, it is not possible to reformat an eToken on Linux. Due to licensing restrictions we cannot supply the eToken drivers and libraries on. The eToken PRO is fully supported by OpenSC and is well tested. EToken PRO is a user access control USB token that provides strong user authentication. E-token Pro (72K) Java. Enter your current eToken password in the “Current Password. Aladdin provides their own software, which comprises both the middleware (necessary for all Card. OS- based tokens) and the key- management tool (also for Linux (link outdated)) which is not compatible with PKCS#1. He donated two e. Token PRO (3.

This project intends to provide open-source support for Aladdin's eToken R2under Linux and other operating systems by implementing all necessary APIs andtools.The project focuses on understanding the operation and protocols of the eTokenR2, and implementing an SDK for Linux to work with these tokens. The projectalso aims at creating end-user tools and wrappers.A link to this project's SourceForge summary page can be found.The (now probably deprecated) eToken R2 was one of the first tokens produced byAladdin (now )around 2002.The device can hold data in one of threesecurity levelsPublic Available to everyone holding the token.Private Available to everyone holding the token, and knowing the token'spasswordSecret Available only to the token itself (and the manufacturer). Isn'tavailable to the token's holder, owner or perpetrator.On top of these three security levels, the token implements the following:Disk-on-key style storage Arbitrary files may be stored on the token,and accessed freely by just plugging it in.

It is referred to as 1-factorauthentication ( what-you-have).Protected storage Along public files, private files may be stored. Thesefiles may also contain arbitrary data, but access to them will not be granted bythe token unless the user has logged into it using a password. This referred toa 2-factor authentication ( what-you-have and what-you-know).Key files Similarly to public and private files, two types of key filesmay be created on the token. These 128-bits (120-bit effective) files arewrite-only, and cannot be read once written correct?Key files are useful as the token allows you to encrypt and decrypt arbitrarydata using these keys, without getting the keys out of the device. Publickey-files may be used by anyone holding the token, while private key-files mayonly be used by logged-in users. Again, these are called 1-factor and 2-factorkeys (not to be confused with private and public keys of an asymmetric cipher).In addition, the device supports on-chip keygeneration verify.Hardware-wise, it is a simple security device, basically containing twocomponents: An 8-bit micro-controller responsible for USB communication,encryption algorithm implementation and the token's secret data storage,providing the trusted environment for the token; and an external EEPROM, up to32-kilobytes in size.The secret token's key is stored on the MCU itself, and is inaccessible, evento the token's owner.

It is known only to the manufacturer. It is claimed to begenerated off of a true random seed for every token. The token's security isbuilt around this key - having it will compromise all the data on the token,and everything the token gives access to. However, it should be very hard toextract this key from the token, even with unlimited physical access anddestructive operations on the chip.The on-device DES implementation isn't used directly, as 56-keybits isn't secureenough these days. Instead, the hardware utilizes a variant of the DES-Xalgorithm (see section ), which uses a much stronger 120-bitkeys.The external EEPROM holds the device's storage (files and key-files).

It isencrypted, probably using the token's internal key, making it useless to readit directly.1. 1 Filesystem OverviewThe eToken supports an hierarchical filesystem structure much like any otherfilesystem. All files and directories have a 4-letter name representing a16-bit hexadecimal number composed of four of the letters: 0 through 9 and Athrough F.Four types of files can be stored on the token:Root Entry Only one exists.

It is the base directory, and all other fileson the token must be under it (though not directly). The token's root isreferenced with the path /3f00.Directories A directory may lay directly under the root, or under anotherdirectory. Directories may be public or private.Files File may lay right under the root directory, or under anotherdirectory. Files hold arbitrary data.Key Files Like files, only used for encryption and decryption.In addition to arbitrary files and directories the user may store on the token,there are a few built-in files that have special meaning:/3f00/a1a1 Application mapping file whatis that? /3f00/8000/0004 Token caching mode. Either 0 or1. Indicates (and I guess) whether filesystem changes to the tokenshould be cached, or flushed immediately./3f00/8000/aaaa Token's name.

Java

User customize-able name for thetoken.Support for the eToken R2 under Linux is under development. Therefore, for a true DES-X application, a 184-bit key is needed (64-bitsfor, 56-bits for and 64-bits for ). The eToken uses a shorter,120-bits key, where.From now on, we'll reference an eToken DES-X key a a pair of two keys, where is a 64-bit DES key (56-bits effective, every8 th bit is ignored) and is a 64-bit block correspondingto and.The eToken R2 is communicated through USB controltransfers. Every interaction with the token requires the host to send twocontrol messages: Request and Result.A basic understanding of USB packets is required for the following sections.3. 1 Request ControlThe request control directs the token to perform an action with some optionalarguments.

It may directs it to read a memory address, or to generate achallenge for login.The host should set the request packet's values as follows. Table 1:Request Control USB Packet Structure Request Type0x40Request CodeCommand to perform (see table )ValueCommand argument used in some commands. Set to 0 if notin use.IndexNot in use (set to 0)BufferCommand's input data ( NULL if none)This transfer should be followed with a result control, to obtain the token'sresponse.The result control message stimulates the token to give back the result of theprevious operation requested from it with the Request Control (see section ).The host should set the request packet's values as follows. Table 2:Result Control USB Packet Structure Request Type0xc0Request CodeRespective request control request code, ORedwith 0x80. (MSB high) E.g., If this is a result control forrequest 0x04, set field to 0x84)ValueNot in use (set to 0)IndexNot in use (set to 0)BufferBuffer to store token's response data. Should be at least onebyte in length for result code (see below)After sending this control packet, our buffer should contains the token'sresult data.

You should always check the last byte of this buffer, as it isappended the the expected data by the token. This byte contains the token'ssuccess code for the operation.

0 indicates success, and all othervalues indicate failure. Figure 1:Configuration word structureUnidentified 16 bytes of unidentified dataFirmware Version eToken's firmware versionToken ID Current token's unique IDFilesystem Address Address from which to read filesystem (seesection )To obtain the configuration word, call the token with request code0x04 (see table ). Don't forget to allocate 27bytes for response, and check the last byte as the operation's status code!3.

4 Log-in Challenge-responseWhen the token is first connected to a computer, it is in the logged-off state.In this state, the user is able to access public files and key-files only. Toaccess private data, the token must be logged-in.The login process with the token is a simple challenge-response protocol.First, the host requests the token for a challenge, initiating the loginprocess. The host does so using the command 0x00 (seetable ). The token then generates a 64-bitpseudo-unpredictable challenge,. The host then calculates the response asfollows. Where:. is the response to send to the token.

is DES-X key as described in section. Is derivedfrom the 128-bit digest over the token's password so thatthe first 64-bits of the digest are and the last 64-bits are. is the DES-X encryption function with key onblockAs expected, the response to the challenge is also a 64-bit block. This responseis sent to the token using command 0x01 (seetable ). If the last byte of the response buffer is zero,the token is now in the logged-in state.3. 1 Session KeyOnce logged-in, all private-data read and written to and from the token isencrypted using a session key. The session keyis a120-bit DES-X key as described in, derived from the response asfollows.

5 Encryption and Decryption using KeysIn order for encrypted data to be portable to the Windows implementation of theeToken SDK, we must comply with its protocol.3. 1 Key FilesKey files are stored on the token as 24-byte files. These files aren't readable,they are write-only.

As described in Section, the token'simplementation of DESX assumes that, allowing us to store only16 bytes of key data. However, this is not the case.

When addressing a key, wemust specify three address ranges, each 8-bytes long (presumably ranges for). When writing to a key, we specify 24-bytes addresses, butsupply only 16-bytes of key material. These three address ranges are alwaysconsecutive in memory.3. 2 Selecting Key FileTo perform a DESX function with a key file, we must first select the currentkey file with command 0x09.The token expects to find an 8-byte buffer with this request, structured topoint to as follows.

Figure 2:Set DESX Key Command Buffer StructureThe token should respond with a single byte indicating success.3. 3 DESX Operations with Current KeyAfter notifying the token which key we would like to use (see Section), we send the 0x0a command, to perform actual DESXfunction. (The Value field indicates whether we're encrypting ordecrypting, see Table ). The token can only operate onone block at a time.Since DESX is a block cipher, padding must be used. The eToekn R2 employs thepadding method suggested in (Section 1.1):The input to the DES CBC encryption process shall be padded to a multiple of 8octets, in the following manner.

Let be the length in octets of the input.Pad the input by appendingoctets to the end of the message,each having the value, the number of octets being added. Inhexadecimal, the possible paddings are: 01, 0202,030303, 04040404, 7070707, and 080808. All input is paddedwith 1 to 8 octets to produce a multiple of 8 octets in length. The paddingcan be removed unambiguously after decryption.IMPORTANT! Since the token can only handle one block at a time, theblock-cipher mode in use is up to the implementation. It seems that the WindowsSDK implementation has chosen the incredibly inadequate ECB mode(probably because it's the only mode that doesn't require an IV).

This insecurebehavior must be imitated for our implementation to be able to work with theWindows implementation. I have also introduced into the API an optional ciphermode argument, allowing the use to select a different cipher mode (such as CBC).These outputs, however, are not compatible with Windows SDK outputs andvice-versa.3. 4 Writing Key FilesKey files are writable. To write to a key file, you must be logged-in. Keyfiles are written using the 0x08 command. The buffer expected by thetoken is the same buffer as in the select key command, except 16-bytesof key-data encrypted with the session key (seesection ) should be appended, like so. Note that entries in the filesystem appear in no particular order, except theroot entry 3f00 is always first.To get the filesystem from the token, invoke the read-from-memory command (seetable ) on the address indicated in the configurationword (see section ).

The operation will return the entirefilesystem index. Be sure to allocate enough space for all the entries,signature and last status byte in the receive buffer. I found that my 16kb tokenreturns 31 entries in addition to the signature entry.Each entry should look as follows.

  • Linux user-space implementation of Aladdin's eToken R2 device driver Linux user-space implementation of Aladdin's eToken R2 device driver.

    • Aladdin eToken R2 LinuxDriver
    • Itay Duvdevani
    • Freeware (Free)
    • Windows
  • 'PDFSprite PDF Driver advanced version 8.0' For Windows NT/XP/2000 Supporting compression,fontembed,multi-language , Supporting Text Watermark,Icon Watermark,Security,Document Information,OpenAction,Bookmark and Link for PDFWORD etc.

    • PdfspriteEnDrvAdv.zip
    • Panda eDoc Corporation
    • Shareware ($20.00)
    • 6.41 Mb
    • WinNT 4.x, Windows2000, WinXP
  • Miraplacid Text Driver extracts text from documents. Format text output as plain or formatted text, preview and save to a file, copy to Clipboard, upload to a server or email. Use it for importing text from unsupported document formats.

    • mtdte.exe
    • Miraplacid
    • Shareware ($155.00)
    • 5.67 Mb
    • Win7 x32, Win7 x64, WinOther, WinVista, WinVista x64, WinXP, Other
  • With Solid File System Driver SDK your application can create a virtual disk, accessible for all or chosen applications. The disk contents can be stored in a file, in resource, memory block, database record or wherever you like.

    Microsoft Office 2013 Professional Plus Crack Full Version + Activator 2020Microsoft Office 2013 is proudly developed. It includes premium versions of all the program it contains and these are auto update-able. Download ms office 2013 full crack windows 10.

    • solfsdrv.zip
    • EldoS Corporation
    • Commercial ($2880.00)
    • 8.82 Mb
    • WinXP, Windows2000, Windows2003, Windows Tablet PC Edition 2005, Windows Media Center Edition 2005, Windo
  • In Bus Driver PC driving game, your job is to transport passengers around an attractive and realistic city. You must drive to a timetable on a planned route, whilst obeying traffic rules, and taking care not to upset or injure your passengers.

    • bd_setup_1_5.exe
    • SCS Software
    • Demo ($12.99)
    • 62.13 Mb
    • WinXP, WinVista x64, Windows Vista
  • Eltima Virtual Serial Port Driver creates any number of virtual serial ports in your system and connects them into pairs via virtual null modem cable. You can create as many virtual serial ports in your system as possible to fit your needs.

    • evspd.exe
    • ELTIMA Software GmbH
    • Shareware ($99.95)
    • 3.04 Mb
    • Win98, WinME, WinNT 4.x, WinXP, Windows2000, Windows2003
  • Windows driver backup to keep the system drivers at safe place and have them when you upgrade or reinstall the operating system. Device Driver Backup software to create backup of system drivers and restore them when you reinstall the operating system or upgrade the system. The driver CD is required at the time of installing the OS.

    • cdriverbackup.exe
    • Driver Backup
    • Shareware ($19.95)
    • 1.22 Mb
    • Windows98, WinXP, Windows2000, Windows2003, Windows Vista
  • Internet Explorer Toolbar to help recently qualified drivers to easily find all the main insurance companies who provide great deals on new driver car insurance. With links to 'female only' and 'young' driver insurance deals this tool has it all.

    • New_Driver_Car_Insurance_Finder.exe
    • New Driver Car Insurance
    • Freeware (Free)
    • 1.06 Mb
    • Win98, WinME, WinNT 3.x, WinNT 4.x, Windows2000, WinXP, Windows2003, Windows Vista
  • Driver Detective has recently been built from the ground up and is an industry first in providing manufacturer specific drivers for your computer.

    • DriverDetective.exe
    • Driver Co.,Ltd
    • Shareware ($44.99)
    • 4.35 Mb
    • Windows2000, WinXP, Windows2003, Windows Vista
  • Driver Pack Interface 1 Beta 5 http://www.03compu.ru/driverpack.

    • drp_beta_5.exe
    • 03compu.ru
    • Freeware (Free)
    • 7.15 Mb
    • WinXP, Windows2000
  • Driver Detective has recently been built from the ground up and is an industry first in providing manufacturer specific drivers for your computer.

    • Drvedetec.exe
    • newqite.com
    • Shareware ($29.95)
    • 4.35 Mb
    • Windows2000, WinXP, Windows2003, Windows Vista
  • Driver Checker can effectively detect the outdated or broken device drivers and automatically update them to the lastest version. You can back up the existing drivers and restore them in case that the drivers were broken or need to be restored.

    • DriverChecker_Setup.exe
    • CheeseSoft Ltd
    • Shareware ($34.95)
    • 1.18 Mb
    • Windows2000, WinXP, Windows2003, Windows Vista

Related:Etoken Sdk - Etoken Utilities - Aladdin Etoken Runtime - Etoken Renault Download - Aladdin Etoken Software
Pages : 1 2 3>