Re: Security standards for Mobile Device vs "PCs"

On 2012-07-30 19:09, Ryan Sleevi wrote:
> Note that the SysApps WG is about defining privileged APIs that, by and large, are NOT granted to "web" pages.
> 
> I don't believe David's example may best reflect the interaction between these two. Examples that may be suitable includes:
> - Polyfilling the Web Crypto API using APDUs to interact with the SE to enumerate keys and algorithms,
>   without requiring browser/OS specific support for the SE. This includes adding new/custom algorithms
> - Secure key provisioning that then causes keys to be available via the Web Crypto API.
> - Proof of possession primitives beyond those afforded by the base web crypto API.

This concept will get considerable competition from parties
who have more faith in establishing a standard SE API that
relieves issuers and relying parties from dealing with the
gazillion of smart card dialects which to date have made
smart card usage a true guesswork.

Why inherit something that has never worked before?
To do what?  Java SE applet deployment?

Possibly related:
http://code.google.com/p/seek-for-android/wiki/WebScapi

Google can make pigs fly?
I wouldn't count on it :-)

Cheers,
Anders

> 
> Again, these APIs are /not/ intended for the "general" web (see their charter for more details).
> 
> On Jul 30, 2012 10:00 AM, "David Dahl" <ddahl@mozilla.com <mailto:ddahl@mozilla.com>> wrote:
> 
>     I think an psuedo-example of how this might work with the Web Crypto API is:
> 
>     1. A page uses the Secure Element API to query for hardware devices
>     2. The script finds the SE to use, sets it as default for the current page
>     3. The Web Crypto API is employed for a crypto operation: the current default hardware module is used instead of the browser-supplied software, to create a signature, etc.
> 
>     Again, this is just a stab in the dark at how these two APIs *might* work together.
> 
>     Regards,
> 
>     David
> 
>     ----- Original Message -----
>     From: "Anders Rundgren" <anders.rundgren@telia.com <mailto:anders.rundgren@telia.com>>
>     To: "David Dahl" <ddahl@mozilla.com <mailto:ddahl@mozilla.com>>
>     Cc: public-webcrypto-comments@w3.org <mailto:public-webcrypto-comments@w3.org>, "Ryan Sleevi" <sleevi@google.com <mailto:sleevi@google.com>>
>     Sent: Monday, July 30, 2012 11:45:50 AM
>     Subject: Re: Security standards for Mobile Device vs "PCs"
> 
>     On 2012-07-30 18:08, David Dahl wrote:
>     > Anders:
>     >
>     > Have you seen the draft charter for the SysApps WG?  http://www.w3.org/2012/05/sysapps-wg-charter.html
> 
>     Thank you David!
>     I hadn't heard about one.  There's too much noise out there :-)
> 
>     I also took a peek at Gemalto's API write-up.
>     Personally, I don't see that 7816 and APDUs have a mission to carry out on the web.
> 
>     In fact, in my take on this topic there is no (web) API at all!
> 
>     This will *very* interesting...
> 
>     Cheers,
>     Anders
> 
> 
>     >
>     > "Secure Elements API
>     > An API enabling the discovery, introspection, and interaction with hardware tokens (Secure Elements) that offer secure services such as tamper-proof storage, cryptographic operations, etc. Example: Gemalto Secure Elements."
>     >
>     > This looks like it might be a nice complement to the web crypto API
>     >
>     > Cheers,
>     >
>     > david
>     >
>     > ----- Original Message -----
>     > From: "Anders Rundgren" <anders.rundgren@telia.com <mailto:anders.rundgren@telia.com>>
>     > To: "Ryan Sleevi" <sleevi@google.com <mailto:sleevi@google.com>>
>     > Cc: public-webcrypto-comments@w3.org <mailto:public-webcrypto-comments@w3.org>
>     > Sent: Monday, July 30, 2012 1:34:10 AM
>     > Subject: Re: Security standards for Mobile Device vs "PCs"
>     >
>     > On 2012-07-29 09:59, Ryan Sleevi wrote:
>     >> Thank you for your feedback, Anders.
>     >>
>     >> I'm not sure I understand how this relates to the work of the Web
>     >> Cryptography Working Group. As has been mentioned before, smart card
>     >> provisioning is out of scope for the efforts of this working group.
>     >> While I realize you and others may have many thoughts to offer on the
>     >> matter, I think it is important for the continued progress of the
>     >> working group that we're able to focus our efforts on in-scope work.
>     >> For general comments about the future of (PKI, certificates, keys,
>     >> arbitrary crypto schemes), there may be other forums better suited for
>     >> such thoughts and ruminations.
>     >
>     > Ryan,
>     > You should look at this as a comment from the outside.
>     >
>     > The term "Smart Card" is misnomer.
>     >
>     > *Nobody* is trying to make traditional smart cards usable in PCs.
>     >
>     > *Everybody* is working with provisioning of embedded SEs including Google.
>     >
>     > That's about it.  It might be a future step for Web Crypto or it might
>     > be something entirely different.
>     >
>     > br
>     > ar
>     >
>     >>
>     >> In addition, speculation about Apple's motives does not seem
>     >> appropriate, the least of all being that it's not at all an accurate
>     >> representation. Apple has made it very clearly publicly that they're
>     >> moving away from the CDSA and CSSM framework that underpinned the
>     >> TokenD effort (as well as underpinning their X.509 and PKI handling),
>     >> so naturally it means that every TokenD written is incompatible with
>     >> the new APIs (eg: Security Tranforms). This is not at all an issue
>     >> with "smart cards" vs "non-smart-cards", but instead simply a matter
>     >> of cryptographic APIs and the need to deprecate the legacy APIs.
>     >>
>     >> While feedback is very much welcome on the ongoing Editor's Drafts,
>     >> please do try to keep comments in scope, and please keep in mind that
>     >> there will be problems and use cases that we cannot and will not
>     >> address within the either the FPWD or within the first delivered
>     >> version of this API.
>     >>
>     >> Regards,
>     >> Ryan
>     >>
>     >> On Sat, Jul 28, 2012 at 10:53 PM, Anders Rundgren
>     >> <anders.rundgren@telia.com <mailto:anders.rundgren@telia.com>> wrote:
>     >>> A thing that I feel will affect the outcome of many security standardization initiatives is how they relate to the two major platforms.
>     >>>
>     >>> If we for example take the smart card issue, it has proven beyond doubt to be unsolvable in the PC while being piece of cake in mobile devices.
>     >>> What do I mean with unsolvable?  The ability to enroll credentials in smart card via a browser.  It is actually so difficult just getting a "standard" smart card to work for logging in that Apple removed support for all cards but the US PIV card in their latest MacOS!
>     >>>
>     >>> How come it is piece of cake in a mobile devices?  Because embedded SEs like the NXP chip powering the Google Wallet eliminate readers, third-party middleware and the mapping guesswork.
>     >>> IMO this is the only way to make smart cards "first class citizens" in consumer computers.
>     >>>
>     >>> Web Crypto haven't taken a position on these issues in an attempt to keep neutrality.   Personally, I'm more interested in the 80% than in supporting a very difficult < 5% audience.
>     >>>
>     >>> http://news.cnet.com/8301-1023_3-57481166-93/oauth-2.0-leader-resigns-says-standard-is-bad
>     >>>
>     >>> Anders
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>>
>     >>
>     >>
>     >
>     >
>     >
> 
> 

Received on Monday, 30 July 2012 18:49:59 UTC