Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
github.com/nfc-tools/libnfc
*-
* Free/Libre Near Field Communication (NFC) library
*
* Libnfc historical contributors:
* Copyright (C) 2009 Roel Verdult
* Copyright (C) 2009-2015 Romuald Conty
* Copyright (C) 2010-2012 Romain Tartière
* Copyright (C) 2010-2013 Philippe Teuwen
* Copyright (C) 2012-2013 Ludovic Rousseau
* Additional contributors:
* See AUTHORS file
-*
libnfc is a library which allows userspace application access to NFC devices.
The official web site is: http://www.nfc-tools.org/
The official forum site is: http://www.libnfc.org/community/
The official development site is: https://github.com/nfc-tools/libnfc
Important note: this file covers POSIX systems, for Windows please read README-Windows.md
Some NFC drivers depend on third party software:
pn53x_usb & acr122_usb:
acr122_pcsc:
pcsc:
The regression test suite depends on the cutter framework: http://cutter.sf.net
Note: If working directly from a git clone of the repository, some of the files need to be generated first. To do this run
autoreconf -vis
Alternatively use a .tar.bz2 version of a packaged release (which already contains ./configure): https://github.com/nfc-tools/libnfc/releases/
The build should be as simple as running these commands:
./configure
make
To build with specific driver(s), see option --with-drivers=...
detailed in ./configure --help
.
make install
You may need to grant permissions to your user to drive your device. Under GNU/Linux systems, if you use udev, you could use the provided udev rules. e.g. under Debian, Ubuntu, etc.
sudo cp contrib/udev/93-pn53x.rules /lib/udev/rules.d/
Under FreeBSD, if you use devd, there is also a rules file: contrib/devd/pn53x.conf.
In order to change the default behavior of the library, the libnfc uses a configuration file located in sysconfdir (as provided to ./configure).
A sample commented file is available in sources: libnfc.conf.sample
If you have compiled using:
./configure --prefix=/usr --sysconfdir=/etc
you can make configuration directory and copy the sample file:
sudo mkdir /etc/nfc
sudo cp libnfc.conf.sample /etc/nfc/libnfc.conf
To configure multiple devices, you can either modify libnfc.conf or create a file per device in a nfc/devices.d directory:
sudo mkdir -p /etc/nfc/devices.d
printf 'name = "My first device"\nconnstring = "pn532_uart:/dev/ttyACM0"\n' | sudo tee /etc/nfc/devices.d/first.conf
printf 'name = "My second device"\nconnstring = "pn532_uart:/dev/ttyACM1"\n' | sudo tee /etc/nfc/devices.d/second.conf
You can override certain configuration options at runtime using the following environment variables:
LIBNFC_DEFAULT_DEVICE=<connstring>
: LIBNFC_DEFAULT_DEVICE=pn532_uart:/dev/ttyACM0
will use pn532 on /dev/ttyACM0 as default deviceLIBNFC_DEVICE=<connstring>
will ignore all devices in the config files and use only the one defined in the variableLIBNFC_AUTO_SCAN=<true|false>
overrides allow_autoscan
option in the config fileLIBNFC_INTRUSIVE_SCAN=<true|false>
overrides allow_intrusive_scan
option in the config fileLIBNFC_LOG_LEVEL=<0|1|2|3>
overrides log_level
option in the config fileTo obtain the connstring of a recognized device, you can use nfc-scan-device
: LIBNFC_AUTO_SCAN=true nfc-scan-device
will show the names & connstrings of all found devices.
To report a bug, visit https://github.com/nfc-tools/libnfc/issues and fill out a bug report form.
If you have questions, remarks, we encourage you to post this in the developers community: http://www.libnfc.org/community
Please make sure to include:
The version of libnfc
Information about your system. For instance:
And anything else you think is relevant.
A trace with debug activated.
Reproduce the bug with debug, e.g. if it was:
$ nfc-list -v
run it as:
$ LIBNFC_LOG_LEVEL=3 nfc-list -v
How to reproduce the bug.
Please include a short test program that exhibits the behavior.
As a last resort, you can also provide a pointer to a larger piece
of software that can be downloaded.
If the bug was a crash, the exact text that was printed out
when the crash occured.
Further information such as stack traces may be useful, but
is not necessary.
Patches can be posted to https://github.com/nfc-tools/libnfc/issues
If the patch fixes a bug, it is usually a good idea to include all the information described in "How to Report Bugs".
If your Touchatag or ACR122 device fails being detected by libnfc, make sure
that PCSC-lite daemon (pcscd
) is installed and is running.
If your Touchatag or ACR122 device fails being detected by PCSC-lite daemon
(pcsc_scan
doesn't see anything) then try removing the bogus firmware detection
of libccid: edit libccid_Info.plist configuration file (usually
/etc/libccid_Info.plist
) and locate <key>ifdDriverOptions</key>
, turn
<string>0x0000</string>
value into 0x0004
to allow bogus devices and restart
pcscd daemon.
Using an ACR122 device with libnfc and without tag (e.g. to use NFCIP modes or
card emulation) needs yet another PCSC-lite tweak: You need to allow usage of
CCID Exchange command. To do this, edit libccid_Info.plist
configuration file
(usually /etc/libccid_Info.plist
) and locate <key>ifdDriverOptions</key>
,
turn <string>0x0000</string>
value into 0x0001
to allow CCID exchange or
0x0005
to allow CCID exchange and bogus devices (cf previous remark) and
restart pcscd daemon.
Warning: if you use ACS CCID drivers (acsccid), configuration file is located
in something like: /usr/lib/pcsc/drivers/ifd-acsccid.bundle/Contents/Info.plist
Libnfc cannot be used concurrently with the PCSC proprietary driver of SCL3711. Two possible solutions:
Since Linux kernel version 3.1, a few kernel-modules must not be loaded in order to use libnfc : "nfc", "pn533" and "pn533_usb". To prevent kernel from loading automatically these modules, you can blacklist them in a modprobe conf file. This file is provided within libnfc archive:
sudo cp contrib/linux/blacklist-libnfc.conf /etc/modprobe.d/blacklist-libnfc.conf
Libnfc can work with PCSC proprietary driver of bR500 and R502, which is already available on most Linux setups.
To activate the PCSC support: ./configure --with-drivers=pcsc
.
Readers known to work:
These readers are support by CCID since v1.4.25, make sure your CCID driver version higher or equal to 1.4.25.
On MacOS, you can check your CCID version with the following command, and if required, you can install latest CCID driver from https://github.com/martinpaljak/osx-ccid-installer/releases
grep -A 1 CFBundleShortVersionString /usr/local/libexec/SmartCardServices/drivers/ifd-ccid.bundle/Contents/Info.plist
On Linux, you can check your CCID version with the following command, and if required, you can install latest CCID driver from https://ccid.apdu.fr/
grep -A 1 CFBundleShortVersionString /usr/lib/pcsc/drivers/ifd-ccid.bundle/Contents/Info.plist
FeliCa is a registered trademark of the Sony Corporation. MIFARE is a trademark of NXP Semiconductors. Jewel Topaz is a trademark of Innovision Research & Technology. All other trademarks are the property of their respective owners.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.