Access system implementation with Raspi and RFID (ISO-14443) cards. Makes uncloneable cards possible with cryptography (unlike many commercial systems). With status reporting over IRC and SFTP.
Find a file
2015-12-04 17:10:13 +01:00
.gitignore gitignore 2014-07-20 22:32:50 +02:00
brmdoor_adduser.py retab 2014-08-22 21:38:03 +02:00
brmdoor_authenticator.py HMAC failure is logged. 2014-07-23 13:20:59 +02:00
brmdoor_nfc.config.sample Numbering note in config. 2014-07-26 00:12:58 +02:00
brmdoor_nfc.cpp Removed explicit target deselection from scanUID. 2014-07-22 11:30:26 +02:00
brmdoor_nfc.h Sending APDUs 2014-07-22 11:13:45 +02:00
brmdoor_nfc.i Documentation fixes 2014-07-23 22:17:43 +02:00
brmdoor_nfc_daemon.py Make sure lock pin is pulled down when exiting on interrupt 2014-07-24 18:42:23 +02:00
create_authenticator_db.py Added Yubikey Neo HMAC authenthication 2014-07-23 13:12:15 +02:00
Doxyfile Doxygen documentation generation 2014-07-19 17:13:29 +02:00
Makefile Update python-config to python2.7-config, now default on Raspbian 8 2015-12-04 17:09:59 +01:00
README.md Update README 2015-12-04 17:10:13 +01:00
test_nfc.py Remove open-close-select from test script. 2014-07-22 13:12:16 +02:00
test_uids_db.sqlite Added Yubikey Neo HMAC authenthication 2014-07-23 13:12:15 +02:00
unlocker.py Make sure lock pin is pulled down when exiting on interrupt 2014-07-24 18:42:23 +02:00

Brmdoor via libnfc

This is an access-control system implementation via contactless ISO 14443A cards and a PN53x-based reader. So you basically swipe your card, and if it's in database, the door unlocks.

It's primarily intended for Raspberry Pi, but can work for other plaforms that can work with libnfc (including common x86 systems).

Info about authorized users and their cards and keys is stored in sqlite database.

Building

You need just to run make. Additional dependencies:

  • SWIG
  • WiringPi2 pythonic binding (for switching lock on Raspberry)
  • you may have to change python2.7-config to python-config on some older systems in Makefile

Howto

  1. Create the database

     python create_authenticator_db.py authenthicator_db.sqlite
    
  2. Copy sample config file, edit your pins, DB file location, timeouts

     cp brmdoor_nfc.config.sample brmdoor_nfc.config
    
  3. Add some users

  • either authenthication by UID, e.g.:

    brmdoor_adduser.py -c brmdoor_nfc.config -a uid 34795FCC SomeUserName
    
  • authenthication by Yubikey's HMAC-SHA1 programmed on slot 2

    brmdoor_adduser.py -c brmdoor_nfc.config -a hmac 40795FCCAB0701 SomeUserName 000102030405060708090a0b0c0d0e0f31323334
    
  • to program Yubikey slot 2 to use HMAC with given key, use:

    ykpersonalize -2 -ochal-resp -ohmac-sha1 -ohmac-lt64 -oserial-api-visible
    

Finally, run the daemon:

    python brmdoor_nfc_daemon.py brmdoor_nfc.config