- From: Mountie Lee <mountie.lee@mw2.or.kr>
- Date: Wed, 22 Aug 2012 11:17:28 +0900
- To: Ryan Sleevi <sleevi@google.com>
- Cc: Web Cryptography Working Group <public-webcrypto@w3.org>
- Message-ID: <CAE-+aYKAUmaY_CYOyWVuuoFhxzAuueneaxJVO1QBLq6QtacA_g@mail.gmail.com>
On Wed, Aug 22, 2012 at 10:33 AM, Ryan Sleevi <sleevi@google.com> wrote: > On Tue, Aug 21, 2012 at 6:14 PM, Mountie Lee <mountie.lee@mw2.or.kr> > wrote: > > Hi. > > thanks for your quick reply. > > > > the certificate issued from CA has the private key pair. > > > > maybe the CA will be origin-A for generating key pair. > > > > for signing document with private key-A, > > can be the signing operation initiated from origin-B? > > > > is it belong to secondary feature of TLS handling? > > > > regards > > mountie. > > I don't have a good answer for that =) > > As currently spec'd, no. One of the reasons why I didn't add it to the > FPWD is that Wan-Teh raised the concern (and similar text is expressed > in the security considerations), is that it would allow Origin-B to > act as a signing oracle and sign messages of any type, including > fraudulent messages. That means your effective security for the key is > limited to the effective security of all origins that have access to > the key - which can be rather large. > > ==> if the server sign the message (that will be presented to client) and verify the message before signing on client side, can it be one of the solution? ==> if user agent trust the certificate of client and server BOTH, can it be allowed? In the TLS+<keygen> case, this isn't so bad, because the only access > to the key exposed to web origins is signatures on the TLS > ClientCertificateVerify message. Yes, all native applications can > spoof the user to any server, but this is, I think, a slightly > different security model. > > I've been trying to find a way to propose text that balances these > concerns, but to be honest, I don't have a good solution. Part of this > is what lead to the proposal of requiring CSP, since this can mitigate > (some of) the security concerns, but I think there's still a lot of > security risks that have to be talked through and discussed before we > go too far. > > However, why I'm not *too* concerned about this (at least, not yet), > is one could imagine using Web Intents, either to Origin-A or to some > "Web Application" (read: extension / offline application) to provide a > signing service. Origin-B will start an activity for that event, which > will cause the information to be passed to Origin-A (or, more likely, > to the extension / offline app), which then using the web crypto APIs, > performs the signing for *just that messge*, and then passes the reply > back to Origin-B. > > In such a scheme, the security of the key is preserved, AND it avoids > the platform-specific APIs. Plus, there's already W3C work going on > for such application schemes, so although it's a bit U-A specific > today, it won't always be the case (I hope). > > ==> could you inform me the URL for these schemes on W3C? ==> SAML ( http://en.wikipedia.org/wiki/SAML_2.0 ) has a similar scheme I think Still, way, way better than platform plugins. > > Maybe. > > > > > > > On Wed, Aug 22, 2012 at 10:03 AM, Ryan Sleevi <sleevi@google.com> wrote: > >> > >> On Tue, Aug 21, 2012 at 5:55 PM, Mountie Lee <mountie.lee@mw2.or.kr> > >> wrote: > >> > Hi. > >> > when I read latest draft API, > >> > I have some question. > >> > > >> > is it possible > >> > user-A generate key-A from origin-A > >> > and user-A use key-A in origin-B? > >> > >> Depends on the user agent. > >> > >> What doesn't depend on the user agent is, as currently specified, > >> there is no way for origin-B to request access to key-A from origin-A. > >> Nor is there, as currently specified, a way for origin-A to grant > >> access to key-A to origin-B proactively (eg: during generation). > >> > >> > > >> > does the key-A is bounded to origin-A? > >> > >> Absent any collusion of the user agent, yes. > >> > >> > > >> > regards > >> > mountie. > >> > > >> > ======================================= > >> > PayGate Inc. > >> > THE STANDARD FOR ONLINE PAYMENT > >> > for Korea, Japan, China, and the World > > > > > > ======================================= > > PayGate Inc. > > THE STANDARD FOR ONLINE PAYMENT > > for Korea, Japan, China, and the World > > > > ======================================= PayGate Inc. THE STANDARD FOR ONLINE PAYMENT for Korea, Japan, China, and the World
Received on Wednesday, 22 August 2012 02:18:17 UTC