OpenSC @ FOSDEM 2012
A reminder to start planning early and to have a booth. FOSDEM 2011 was a huge success.
Table of Contents
- What, Where, When?
- FOSDEM 2012, February 04-05 2012, Brussels, Belgium. The security/crypto devroom will be in room H.2214 on both days, for 8 hours. There will be room for up to 100 people.
- Topic: "(hardware) security / crypto"
- To raise the awareness of OpenSC and smart cards in general; to meet with other developers and promote integration; to meet with a wide audience and hear their thoughts and needs; to have fun and enjoy Belgian beer. (thread on opensc-devel).
- Subscribe to email@example.com mailing list!
- Call for presentations in the security devroom (a slight modification of 2011 CFP for now, may be updated a bit, but the procedure will remain).
- Security/hardware/crypto related talks and presentation on Saturday
- A dinner somewhere on Saturday evening
- "Real" devroom with actual hacking, hardware, software etc on Sunday. If you know you will be bringing some hardware, please note it down.
- Fix schedule.
Proposals / submissions for Day 1
- Talks, presentations, demos etc. DEADLINE: 20.01.2012
- A (15m) Set up of tech, introduction of talkers and some words for participants.
- B (30m, Tomas Gustavsson) CESecore and common criteria certification of open source sw (mailing list post).
- C (45m, Branko Majic) Deployment and Use of X.509 in Free Software Components (with devroom demo environment if I get some hands on hardware able to run lots of VM's) (mailing list post)
- D (45m Kashyap Chamarthy Overview and a demo of Dogtag Certificate system -- An open source and open standards based PKI project. I'll also show a quick demo where Certificate System and its subsystems(CA, OCSP, KRA[key-recovery-archival] ) would be configured on a virtual machine. (mailing list post)
- E (45m) Benedikt Heintel, CACert .org "Trust - the root of evil?!"
- Abstract: "In a highly connected world like ours is trust one of the most important assets. But what if the root to trust is not trustworthy?
2011 was the year where one Certificate Authority (CA) after the other came to fall. The cases of the Dutch DigiNotar? and the Malaysian DigiCert? are the best know. The system of commercial CAs depends on a wrong understanding of liability and trust. CAcert's web of trust tries to overcomes the liability issues by trusting a group of trusted people wherein each individual is liable for its own action.
This talk enlightens why most commercial CAs are not trustworthy by default, what we can learn from 2011's cases, what makes CAcert different, why CAcert is not in the browsers by default and what we do to make it happen."
- F (45m) Embedded/GPU crypto, yaSSL
- yaSSL made some great progress in the past year with the CyaSSL embedded SSL library. As such, this talk will provide an overview of technical and community progress in the last year and news on the current state of yaSSL. Details on what's new will include the addition of new cipher suites and cipher modes, better portability, new ports to software projects and operating systems, and community involvement.
- G (45m, Anders Rundgren, A technical description of http://webpki.org/papers/keygen2/sks-keygen2-exec-level-presentation.pdf - An Open Source / Open Hardware scheme for making security hardware as easy to deploy as passwords)
Proposals for Day 2
Activities related to actual coding
- OpenSC codesprint
- "Lets cross the bridge" codesprint - to make tokens work with more software. p11-kit integration?
- If your project uses any kind of crypto, you might want to stop by and see how it would be best to extend that support to hardware keys.
- System integration of various components to use X.509 certificates for authentication/authorisation
If you know that you will be coming to security devroom, please mark down your name, IRC nick or something else, so that contacts could be made before and afterwards.
- Martin Paljak / .ee / OpenSC
- Branko Majic (azaghal) / .rs / Unaffiliated
- Emanuele Pucciarelli / .it / OpenSC