[SmartcardServices-Users] CAC login on OS X 10.7 & 10.8

Michael Kluskens michael.kluskens at nrl.navy.mil
Thu Feb 21 08:01:14 PST 2013


I identified a problem with SystemCACertificates & Keychain, it refuses to stick in my login keychain (unless I "Add keychain), I'm certain the proper way is for SmartCardServices put it in the System list as shared, but it disappears after a reboot, and when I try to add it myself to the System List it refuses to stay, and if it ever does, it rapidly disappears.

This should be why I see the following error in secure.log

Feb 21 10:49:43 mskpro authorizationhost[998]: validate chain started
Feb 21 10:49:43 mskpro authorizationhost[998]: Certificate could not be verified: 5
Feb 21 10:49:43 mskpro authorizationhost[998]: validate chain completed with: 5
repeated 3 more times.

I haven't retried with a clean system as the steps I outlined below failed on a clean system and until I known for certain that these are the exact steps there is not much point.

On Feb 20, 2013, at 4:04 PM, Michael Kluskens wrote:

> 1) I cleaned installed and updated OS X Lion on a unused disk.
> 2) I installed the SmartCardServices Installer v2.0.b2 for Lion
> 3) I used sc_auth hash and selected the first hash for use with sc_auth accept -u useraccount -h ...
> 4) I confirmed the hash entry with dscl . -read /Users/useraccount
> 5) I added builtin:smartcard-sniffer,privileged to both the system.login.console and authenticate sections of /etc/authorization
> 
> Confirmed that my Gemalto CAC card works with OS X Mail and Safari, log out and insert card, no effect, reboot, insert card, no effect.
> 
> What step did I miss?  I was never inserting a reader / card on a vanilla install of OS X Lion.
> 
> Are there newer instructions on the precise location for the smartcard-sniffer entries?  What log files do I look at, secure.log seems related but I can't tell if anything in there was an error.
> 
>> There are three methods for associating a Smart Card to a given user account in either the local or remote DS.
>> PubKey Hash			- Default method used by OS X and requires sc_auth
>> Attribute Matching		- requires /etc/cacloginconfig.plist
>> PKINIT					- requires /etc/cacloginconfig.plist and Mac bound to a KDC
>> All methods require that the smartcard-sniffer line be present in /etc/authorization for catching the Smart Card and gathering the PIN for the associated Challenge Response with the card for use of the Private Key on the card.
>> Tokend modules no longer ship with OS X (as of OS X Lion), but are freely available for 10.7, 10.8 from Apple's SmartCardServices project at MacOSForge.  This is why nothing happens when you insert a reader / card on a vanilla install of OS X Lion or higher.  ALL other components of SmartCard Services are present and have even been updated in released versions of OS X since OS X Lion v10.7.0.  
>> Project Site:		
>> http://smartcardservices.macosforge.org/
>> 
>> Installers:		
>> http://smartcardservices.macosforge.org/trac/wiki/installers
>> 
>> There are also third-party commercially supported solutions from, for example, Centrify, charismathics and Thursby.
>> 



More information about the SmartcardServices-Users mailing list