Re: [W3C WebCrypto API WG] Key discovery

> On 2013-04-11 11:51, Samuel Erdtman wrote:
>> Hi Anders,
>>
>> And you feel that webcrypto do not fill that space then? What is missing?
>
> That's a good question!  I would be wrong if I were to answer for
> anybody but myself and I find that PCs are out-of-scope for innovation
> of this kind (CertEnroll is proof of that).  However, mobile devices
> have embedded security hardware or similar and then Web Crypto appears
> to be pretty half-baked.  I think that it should be finished according
> to plan but I seriously doubt it will be particularly important until
> there is a "bridge" between platform keys and Web Crypto.
We are seeing an increased interest in Belgium of the use of SmartCard
readers attached to  tablet devices (iOS and Android for the moment),
for all kind of applications by both government and private business.

Currently those apps are using a proprietary SDK and API. It would be
neat for developers if they could use a cross vendor JS API for there
applications, aside if this requires a custom WebView component based control
or more ideally the standard Web Browser on the platform (but this is probably
a bridge to far initially, because it will require a pluggable native Crypto API
not bound to a specific app).

Nick
>
> I also don't see that Netflix needs a specific solution.  Since they
> have non-standard clients they could let their keys "masquerade" as keys
> provisioned through Web Crypto, possibly including the addition of
> GUI like "hitting OK will give you access to our trial subscription".
>
> Anders
>
>> IMO web crypto now provides the possibility to do certificate
>> enrollment for keys but you will have to build the certificate layer
>> on top of the web crypto key storage and you will be limited to soft
>> certificates. Therefor you might want to use the web crypto API in a
>> different manner then existing key storage e.g do short lived session
>> certificates.
>>
>> Sent from my iPhone
>>
>> On 11 apr 2013, at 08:45, Anders Rundgren <anders.rundgren@telia.com> wrote:
>>
>>> On 2013-04-11 11:42, Samuel Erdtman wrote:
>>>> Hi Anders,
>>>>
>>>> Are you saying that banks and eId (governments) do not have the skills
>>>> or the will to create
>>>
>>> Hi Samuel,
>>> Pardon if I was unclear.
>>>
>>> No, I was referring to Microsoft, Google and Mozilla that to date haven't created a useful solution for on-line certificate enrollment.
>>>
>>> Anders
>>>
>>>>
>>>> Sent from my iPhone
>>>>
>>>> On 11 apr 2013, at 04:57, Anders Rundgren <anders.rundgren@telia.com> wrote:
>>>>
>>>>> On 2013-04-11 03:47, Samuel Erdtman wrote:
>>>>>> Hi,
>>>>>>
>>>>>> Relatively early in the webcrypt work I submitted a set of use-cases (to the public list) that where similar to what you sugests but with a clearer focus on certificates and there keys. You can find it here http://lists.w3.org/Archives/Public/public-webcrypto-comments/2012Jul/0000.html.
>>>>>>
>>>>>> I have requirements similar to yours but since I submitted my use-cases I have learned a lot and changes my position a bit. I still have these requirements, but I think that it should be coupled to certificates not key attributes, and maybe not in webcrypto.
>>>>>>
>>>>>> If I understand the draft that you sent, this discovery mechanism with issuer would not be bound to origin. I think this is wrong since by going outside the SOP we will open pandora's box of security and privacy issues.
>>>>>>
>>>>>> One of the things that we would have to consider is that if I can query for the issuer of eIdīs form every site then it would be very easy to track a user, and the issuer of the eId cannot prevent it. In my initial use-case the webpage would not get the key reference but just the signature if the user accepted to sign and something generic none compromising if the user denied the signature.
>>>>>>
>>>>>> In a later mail I suggested to bind certificate and keys to a domain with an attribute specifying the domain (posible with wildcard), This would put the issuer in control of the usare of the certificate and keys.
>>>>>>
>>>>>> After this I have come  more and more to the conclusion that we really should leave smart cards out of webcrypto, for the time being at least. There exists good but propertarian solution for handling smart cards and I thing that to handle smart-cards we would have to have a much wider scoop. I think that we should fokus on solution where we do not need smart cards for example in the nordic countries we are moving away from smart cards for eIdīs and moving towards server-side signares and short lived certificates (one session only) that is issued when the user can provide some other form of strong authentication e.g. OTP. Then we have the mobile situation where smart cards do not suite very well i.e. we need other solutions. Therefor I think that we should let webcrypto solve problems more relevant to the future then smart cards.
>>>>> IMO, the vendors have so much problems with their existing certificate enrollment solutions that it appears unrealistic that they will succeed doing anything useful of it in Web Crypto:
>>>>>
>>>>> http://lists.w3.org/Archives/Public/public-webcrypto-comments/2013Mar/0076.html
>>>>>
>>>>> Anders
>>>>>>
>>>>>> Best Regards
>>>>>> Samuel Erdtman
>>>>>> Technology Nexus Product Manager
>>>
>>
>>
>
>
>
>


________________________________

Inventive Designers' Email Disclaimer:
http://www.inventivedesigners.com/email-disclaimer

Received on Friday, 12 April 2013 06:13:37 UTC