W3C home > Mailing lists > Public > public-html@w3.org > September 2009

Re: <keygen> element (was RE: Implementor feedback on new elements in HTML5)

From: Jonas Sicking <jonas@sicking.cc>
Date: Tue, 1 Sep 2009 19:34:58 -0300
Message-ID: <63df84f0909011534r4b29babew4883a6c6344a0ed5@mail.gmail.com>
To: Adrian Bateman <adrianba@microsoft.com>
Cc: Maciej Stachowiak <mjs@apple.com>, HTMLWG WG <public-html@w3.org>
On Tue, Sep 1, 2009 at 12:13 PM, Adrian Bateman<adrianba@microsoft.com> wrote:
> On Monday, August 31, 2009 9:46 PM, Maciej Stachowiak wrote:
>> - Newly standard legacy elements: <keygen>, <embed>
>>   We had these for a long time before they were in HTML5. It seems like a
>> good idea to cover them in the spec, even though they are kind of crufty.
>
> Ian Hickson wrote:
>> Opera, Firefox, and Safari all support this element, so we need to define
>> how it works.
>
> Henri Sivonen wrote:
>> It appears that a browser needs to support either Netscape's or
>> Microsoft's certificate enrollment mechanism in order to be compatible
>> with enrollment pages out there. The Netscape mechanism is implemented
>> in 3 out of the top 4 browser engines. As such, it seems like a part
>> of the platform that needs to be specced.
>
> The problem with <keygen> is that it fails to address the requirements that people have for certificate enrolment today. We see two main use cases for client-side certificate auth on the web today. One is some kind of web access to a financial institution like a bank or brokerage firm or to e-government sites. Another is enterprise remote access (although we commonly see the enterprise scenario handled with something like a smart card requiring offline provisioning). It's hard to find examples of <keygen> being actively used today. Most commercial and government implementations use proprietary enrolment mechanisms often based on Java applets, Mozilla's custom generateCRMFRequest, or Microsoft's scriptable APIs such as CertEnroll.
>
> Here are some of the limitations with <keygen>:
>
> 1. <keygen> typically requires the user to select the appropriate key length from a list. Most users are not equipped to make this decision. In general, the server should be able to indicate what type of key pair it wants including acceptable key length, algorithm, etc. For example, RSA 512 may not be something a bank wants to deal with. <keygen> doesn't support this.
>
> 2. Creating the key pair (with <keygen>) and then having a certificate returned from the server to be installed on the client appear to the user as two separate actions. This is a poor user experience and there is no way to avoid this with <keygen>. A better approach would have the key submission and certificate response integrated into the same control.
>
> 3. <keygen> does not provide a mechanism for managing certificate expiry. This forces the user to repeat the initial key creation process whenever certificates expire.
>
> 4. The format used by <keygen> is not standard and only provides a subset of already established protocols like PKCS10 (http://tools.ietf.org/html/rfc2986), CMC (http://tools.ietf.org/html/rfc5272), and CRMF (http://tools.ietf.org/html/rfc4211). This prevents <keygen> from supporting non-RSA based certificates, extensions for additional client information, and key escrow.
>
> These deficiencies mean that browser vendors have introduced alternative mechanisms for managing certificate enrolment.
>
> Given these issues with <keygen> we think that requiring support in order to be a conforming HTML 5 user agent is problematic. At the very least, we believe that <keygen> should be marked as obsolete in the spec. We would prefer that this was removed from the HTML 5 spec and documented elsewhere if necessary. <keygen> only supports part of the old Netscape protocol - the rest of the process isn't documented in the spec.
>
> It is extremely unlikely that Microsoft will ever implement support for <keygen> - we do not believe it provides value for our customers. We are prepared to consider creating common APIs that allow interoperability across browsers and also address customers' real needs either in a future version of the spec or as a separate work item.

I can fully understand microsoft being unwilling to implement this. I
think the reason it's in the spec isn't really because anyone likes
it, but rather because it's a feature a new webbrowser would need to
implement in order to be "compatible with the web".

However, I wonder if implementing <keygen> would actually help a
newcomer. The problem is that I think this is one area where pages do
so much browser detection that it's unlikely that any newcomer will
work out of the box.

One thing we could do is to add a note that this feature is known to
be bad and is intended to be deprecated as soon as alternative
proposals arise. That would give any UA a pretty good story for not
implementing the feature for now.

Hopefully this won't be a problem for microsoft either way. Before
<keygen> is becomes the last holdout for HTML5 compliance in a
microsoft product I hope that there are alternative proposals that can
replace <keygen>, allowing us to deprecate it. (Not because the former
is far away, but because I hope the latter happens soon).

/ Jonas
Received on Tuesday, 1 September 2009 22:35:59 UTC

This archive was generated by hypermail 2.3.1 : Monday, 29 September 2014 09:39:07 UTC