- [Finnish Electronic Identity](#finnish-electronic-identity) - [Requirements for everything](#requirements-for-everything) - [Chromium](#chromium) - [Firefox and Thunderbird](#firefox-and-thunderbird) - [Firefox policy](#firefox-policy) - [Okular](#okular) - [Validation](#validation) - [Root certificates](#root-certificates) - [Testing](#testing) - [FINEID as SSH key](#fineid-as-ssh-key) # Finnish Electronic Identity Finnish identity cards have been electronic for ages and as I tend to forget how to use it on Linux again, here are my notes. - Official application: https://dvv.fi/en/card-reader-software - Fedora/rpm is hidden under "All versions", "Linux versions" - DVV certificate newsletter: https://uutiskirjeet.dvv.fi/uutiset/varmennepalvelut.html ## Requirements for everything PCSDd must be running, it's found in package `pcscd` on Debian and likely `pcsc-lite` on Fedora. ```bash sudo systemctl enable pcscd --now ``` [As in my shell-things repo, /etc/pkcs11/modules/libcryptoki.module should be created;](https://gitea.blesmrt.net/mikaela/shell-things/src/branch/master/etc/pkcs11/modules) ``` module: /usr/lib64/libcryptoki.so managed: no ``` or with the 2026 application `/etc/pkcs11/modules/atostek.module`: ``` module: /usr/lib64/Atostek-ID-PKCS11.so managed: no ``` ## Chromium Should work as long as the `DigiSignApplication` XOR `atostekid` from above was running before the browser was started. In case of issues with `atostekid`, try closing the browser and running `atostekid-setup-user-browser.sh`. ## Firefox and Thunderbird **_This shouldn't apply if the above `libcryptoki.module` or `atostek.module` is created and preferably `libcryptoki.so` or Atostek-ID-PKCS11.so would be loaded anyway_** In Settings, Advanced, Security devices load the module from DVV app before 2026 `/usr/lib64/libcryptoki.so` or `/usr/lib64/Atostek-ID-PKCS11.so` since 2026 or OpenSC: - Debian: `/usr/lib/x86_64-linux-gnu/onepin-opensc-pkcs11.so` - Package: `opensc-pkcs11` - Fedora: `/usr/lib64/onepin-opensc-pkcs11.so` - Package: `opensc` `onepin` is a workaround to not ask for PIN2 which is only used for legal agreements, email signing also uses PIN1. ### Firefox policy Firefox organizational policy can also be used for this, Thunderbird likely has one too. It will affect all users and instances of the application on the computer. In the file `/etc/firefox/policies/policies.json` which must be created if it doesn't exist: ```json { "policies": { "SecurityDevices": { "Add": { "Atostek ID": "/usr/lib64/Atostek-ID-PKCS11.so", "Debian OpenSC onepin": "/usr/lib/x86_64-linux-gnu/onepin-opensc-pkcs11.so", "Fedora OpenSC onepin": "/usr/lib64/onepin-opensc-pkcs11.so", "Fujitsu mPollux DigiSignApplication": "/usr/lib64/libcryptoki.so" } } } } ``` Firefox will silently ignore missing security devices, unless the user explicitly navigates to `about:policies#errors` which will log > Unable to add security device Debian OpenSC onepin Unable to add security > device Fujitsu mPollux DigiSignApplication on _Fedora Linux 43.20260114.0 (Kinoite)_ when using Atostek ID. ## Okular Okular is the KDE document viewer and supports signing PDF files using FINEID! There are three ways to go, they all begin with _Settings_ menu, _Configure backends_ and _PDF_. Set the certificate database to one of the three: - `/etc/nssdb` with password that I don't know. - `~/.pki/nssdb` which password theoretically reads in `~/.digisign/Seed.txt` assuming the official DigiSignApplication is used. - `~/.mozilla/firefox/.` - when Firefox is used (may require the configuration above), didn't ask me for a password, which may be the main password and directly offers the certificates from FINEID. - This seems the most functional, refer to `about:profiles` within Firefox/LibreWolf. Next Apply or OK and restart Okular, open _Tools_ menu and select _Digitally sign..._, draw an area for the signature (which FINEID wants to be big), select where to save the signed .pdf and enter the signing PIN a few times. ### Validation DVV provides a validator in three languages: - [suomeksi](https://dvv.fineid.fi/fi/validation) - [på svenska](https://dvv.fineid.fi/sv/validation) - [in English](https://dvv.fineid.fi/en/validation) ```txt ✔️ PDF document validated. The following signatures were found: 1 valid signatures with EU qualified certificate issuers and signature keys stored in a qualified signature creation device. Signature 1/1: [...] ✔️ The electronic signature is valid and has not been modified or forged after signature. Signature level is PKCS7_B (basic). ✔️ The signature is made by a party trusted by DVV. ✔️ The signature is made with an EU qualified certificate. ✔️ The signature key is stored in an EU qualified signature creation device (QSCD). Signed by: ... Issuer of certificate and root certificate: VRK Gov. CA for Citizen Certificates - G3 | VRK Gov. Root CA - G2 (Trusted) Time of signature: ... (Time stamp not validated by a time stamp authority (TSA)) ``` Although other EIDAS/European signing verification capable services or applications should work too. ## Root certificates While I don't think the user necessarily needs them, my notes mention `DVV Gov. Root CA`. - https://dvv.fi/en/ca-certificates ## Testing - https://dvv.fineid.fi/en/authentication ## FINEID as SSH key 0. I would start by `ssh-add -D` to remove other keys from the ssh-agent. 1. Add the key to the agent - Debian: `ssh-add -s /usr/lib/x86_64-linux-gnu/opensc-pkcs11.so` - Fedora: `ssh-add -s /usr/lib64/opensc-pkcs11.so` 2. Export the public key by `ssh-add -L|head -n1` (the comment should be "todentamis- ja salausavain" ("authentication and encryption key")) 3. Naturally put it into `~/.ssh/authorized_keys`, but SSH should detect it automatically. The file could also be mentioned in `ssh_config` The public key should also be stored somewhere that can be passed to gitconfig or SSH signing commands if SSH signing is to be used. Via: https://www.linux.fi/wiki/HST#Ssh_2