Re: WebCrypto Key Discovery Draft

On Sun, Apr 21, 2013 at 11:29 PM, Anders Rundgren
<anders.rundgren@telia.com> wrote:
> http://www.w3.org/TR/2013/WD-webcrypto-key-discovery-20130108/
>
> Since there are no standards for provisioning "named origin-specific keys", this draft relies on specifically adapted UAs.
> There's absolutely nothing wrong with that but I honestly do not see that you need a _standard_ for such use-cases.
>...

*****

This is troubling (use of the word MAY):

Blocking access to named origin-specific pre-provisioned keys

    User agents may restrict access to
    named origin-specific pre-provisioned
    keys to scripts originating at the domain
    of the top-level document of the browsing
    context, for instance returning empty key
    search results for pages from other
    domains running in iframes.

Under what conditions/circumstances may it (or may it not) restrict
access? HTTPONLY flag? Should there be another flag? Should key
operations only be available on HTTPS connections? How would a site
takes a defensive posture so the key is only available on the login
page, but not other pages (once the key is used to authenticate)? Or
can the key be used for authorization at the transaction level?

Why is it pre-provisioned keys? Wouldn't the concerns (and abuses)
apply to other UA reachable keys as well?

*****

What doe STRONGLY mean?

Treating named origin-specific pre-provisioned keys as cookies

    User agents should present the named
    origin-specific pre-provisioned keys
    feature to the user in a way that associates
    it strongly with HTTP session cookies.

*****

This does not work in practice. The user will not make an informed decision:

Origin-tracking of named origin-specific pre-provisioned keys

    ... If this information is then used t
     present a view of pre-provisioned keys
    to the user, it would allow the user to
     make informed decisions about
     authorizing sites to make use of keys.

*****

Need to hear more about the blacklists.... Is it used in place of
explicit expiration or revocation? What's its format? How is the info
shared?

Jeff

Received on Monday, 22 April 2013 03:58:42 UTC