- From: Aymeric Vitte <vitteaymeric@gmail.com>
- Date: Wed, 10 Apr 2013 18:00:21 +0200
- To: Nick Van den Bleeken <Nick.Van.den.Bleeken@inventivegroup.com>
- CC: Mark Watson <watsonm@netflix.com>, Ryan Sleevi <sleevi@google.com>, Lu HongQian Karen <karen.lu@gemalto.com>, "public-webcrypto@w3.org" <public-webcrypto@w3.org>, Hutchinson Michael <Michael.Hutchinson@gemalto.com>
- Message-ID: <51658C95.2090007@gmail.com>
Hi Nick, I don't know if it's on purpose or not but maybe test.html could reflect more EventTarget (evt.target.result instead of object.result), and, small detail, ||'<li class="ui-widget-content">' + certificates[i] still looks strange. Regards Aymeric Le 09/04/2013 12:47, Nick Van den Bleeken a écrit : > Hi Aymeric, > > I've updated [1] by adding an abstract, a CertificateOperation > interface, and explaining that the 'available' certificates are origin > based made available in a user agent specific manner after requesting > permission to the user. > > I also clarified the use cases a bit at [2]. > > If you have any other comments/remarks please give them ;) > > Kind regards, > > Nick Van den Bleeken > > 1: > https://github.com/InventiveDesigners/webcrypto-key-certificate-discovery-js/wiki/API > 2: > https://github.com/InventiveDesigners/webcrypto-key-certificate-discovery-js/wiki/UseCases > > > On 08 Apr 2013, at 22:16, Aymeric Vitte <vitteaymeric@gmail.com > <mailto:vitteaymeric@gmail.com>> wrote: > >> Hi Nick, >> >> Apparently I missed the wiki for the use case, now, since there are >> different proposals with different use cases/ideas being written >> currently, the idea maybe is to adopt the same conventions (like the >> CertificateOperation interface if everybody agree, and certificate >> discovery should probably follow the same rules as key discovery >> since the job has been done already ) and then at the end everything >> can be merged together and/or interoperate. >> >> Regards, >> >> Le 08/04/2013 18:51, Nick Van den Bleeken a écrit : >>> Thank you Aymeric, >>> >>> My answer is inline. >>> >>> On 8 apr. 2013, at 17:45, "America Vitte" <vitteaymeric@gmail.com >>> <mailto:vitteaymeric@gmail.com>> wrote: >>> >>>> Maybe I am misreading but looking at the API and test.html it seems >>>> to be more related to a certificate discovery proposal rather than >>>> a key-certificate-discovery one (in your example result is an array >>>> of certificates). >>> It's about discovering certificates and their associated keys based >>> on certificate properties. >>>> >>>> And then I don't really understand why for example >>>> |X509CertificateSelector is a KeyOperation and not something like a >>>> CertificateOperation (like in [1] for example) implementing >>>> EventTarget (which you don't really use in your examples, >>>> and|||'<li class="ui-widget-content">' + certificates[i] + >>>> '</li>'|looks strange...), and then certificates discovery should >>>> follow the same SOP rules as key discovery. >>>> | >>> I will incorporate your comments. And add some more documentation >>> (there is a related paper about this work, but that one is not yet >>> public because it is submitted for WASH13). >>> The available certificates will be configurable by the end user on a >>> per site basis (using a subtle UI, something like is done for the >>> location, webRTC, ...) >>>> | >>>> That's not critics but comments, probably it's as start as you >>>> mentioned, for your test your extract certificates and then sign >>>> them if I understand correctly, maybe you should add the use case >>>> in the proposal. >>>> | >>> There is already one use case documented(Document signing). >>> Will add some more. >>> https://github.com/InventiveDesigners/webcrypto-key-certificate-discovery-js/wiki/UseCases >>>> | >>>> Regards, >>>> >>>> [1] https://gist.github.com/Ayms/d21bbab05361bd58c439 >>>> | >>> >>> Thank you for your constructive comments. >>>> | >>>> >>>> | >>>> Le 08/04/2013 12:12, Nick Van den Bleeken a écrit : >>>>> Hi Mark, >>>>> >>>>> You might want to have a look at [1]. >>>>> >>>>> I and a colleague of mine are working on a proposal for a key >>>>> discovery API using its associated X509 certificate. We are still >>>>> in an early phase, but started prototyping the API as native >>>>> browser extension. The API description[2] and code of the >>>>> prototype is available at github at [1]. >>>>> >>>>> We started this project in the hope to keep the discussion about >>>>> getting access to smart cards and USB security tokens on the web >>>>> active. And possibly use it as starting point for a proposal for a >>>>> key/discovery API to the WG. >>>>> >>>>> Kind regards, >>>>> >>>>> Nick Van den Bleeken >>>>> 1: >>>>> https://github.com/InventiveDesigners/webcrypto-key-certificate-discovery-js >>>>> 2: >>>>> https://github.com/InventiveDesigners/webcrypto-key-certificate-discovery-js/wiki/API >>>>> >>>>> >>>>> On 05 Apr 2013, at 02:25, Mark Watson <watsonm@netflix.com >>>>> <mailto:watsonm@netflix.com>> wrote: >>>>> >>>>>> Scope issues aside, on the technical side it's difficult to see h >>>>>> ow this could be interoperable without further specification. >>>>>> >>>>>> Considering the use-case given, there would need to be a >>>>>> specification (somewhere) of the format of the Government-issued >>>>>> certificate which included details of how the various properties >>>>>> of that certificate were handled by the ( attribute name, value ) >>>>>> filter matching (i.e. what are the attribute names and how are >>>>>> their values derived from the certificate and how is the matching >>>>>> done), how the Issuer and isPrivate should be set and what kind >>>>>> of authentication was required. >>>>>> >>>>>> UA's could then know how to support that kind of certificate and >>>>>> applications would know what to look for. >>>>>> >>>>>> Typically in these kind of situations we have a chicken-and-egg >>>>>> problem. There is reluctance to specify a lookup capability in >>>>>> WebCrypto when we have no idea what kinds of things we're trying >>>>>> to look up. On the other hand, noone is going to write a "how to >>>>>> expose XYZ key in WebCrypto" specification if there is obviously >>>>>> no method in WebCrypto to do that. >>>>>> >>>>>> One way to resolve that problem is to signal intent with a simple >>>>>> API and define a registry for specifications that define how it >>>>>> is used. For example, if the getKeys() call included a "type" >>>>>> parameter, with a registry for type values, then implementors >>>>>> would know that to implement getKeys() they just have to look >>>>>> through the registry, get the specifications registered there and >>>>>> implement zero or more of those. There's no requirement to >>>>>> implement any of them. >>>>>> >>>>>> Typically, W3C has preferred people to come to W3C itself and >>>>>> write those specifications here. That has the advantage that the >>>>>> specifications fall under the W3C patent policy. The W3C has >>>>>> deviated from this only when it has been practically impossible. >>>>>> MIME types for media codecs would be an example of a type field >>>>>> with a registry operating in very much the way I described. >>>>>> >>>>>> However, the scope quoted by Ryan does seem to rule out that >>>>>> approach in the short term ... >>>>>> >>>>>> ...Mark >>>>>> >>>>>> >>>>>> >>>>>> On Thu, Apr 4, 2013 at 4:37 PM, Ryan Sleevi <sleevi@google.com >>>>>> <mailto:sleevi@google.com>> wrote: >>>>>> >>>>>> Issuer is underspecified, and as such, not possible to implement. >>>>>> >>>>>> Further, this seems to directly conflict with the charter, >>>>>> which states: >>>>>> >>>>>> "Out of scope: features including special handling directly for >>>>>> non-opaque key identification schemes, access-control mechanisms >>>>>> beyond the enforcement of the same-origin policy, and >>>>>> functions in the >>>>>> API that require smartcard or other device-specific behavior" >>>>>> >>>>>> This requires both handling for non-opaque key identification >>>>>> scheme >>>>>> ("issuer") as well as an access control mechanism ("isPrivate") >>>>>> >>>>>> As such, we do not support the WG taking on this item. >>>>>> >>>>>> On Thu, Apr 4, 2013 at 4:21 PM, Lu HongQian Karen >>>>>> <karen.lu@gemalto.com <mailto:karen.lu@gemalto.com>> wrote: >>>>>> > Hi Mark, >>>>>> > >>>>>> > We would like to suggest expanding the key discovery >>>>>> specification by adding an API for discovering >>>>>> pre-provisioned cryptographic keys via any of their >>>>>> attributes. This gives web applications a mean to find >>>>>> pre-provisioned keys whose names are unknown to them. >>>>>> > >>>>>> > The contribution is attached for review. >>>>>> > >>>>>> > Regards, >>>>>> > Karen and Michael >>>>>> > >>>>>> > >>>>>> >>>>>> >>>>> >>>>> >>>>> ------------------------------------------------------------------------ >>>>> >>>>> Inventive Designers' Email Disclaimer: >>>>> http://www.inventivedesigners.com/email-disclaimer >>>> >>>> -- >>>> jCore >>>> Email :avitte@jcore.fr >>>> iAnonym :http://www.ianonym.com >>>> node-Tor :https://www.github.com/Ayms/node-Tor >>>> GitHub :https://www.github.com/Ayms >>>> Web :www.jcore.fr >>>> Webble :www.webble.it >>>> Extract Widget Mobile :www.extractwidget.com >>>> BlimpMe! :www.blimpme.com >>> >>> ------------------------------------------------------------------------ >>> >>> Inventive Designers' Email Disclaimer: >>> http://www.inventivedesigners.com/email-disclaimer >> >> -- >> jCore >> Email :avitte@jcore.fr >> iAnonym :http://www.ianonym.com >> node-Tor :https://www.github.com/Ayms/node-Tor >> GitHub :https://www.github.com/Ayms >> Web :www.jcore.fr >> Webble :www.webble.it >> Extract Widget Mobile :www.extractwidget.com >> BlimpMe! :www.blimpme.com > > > ------------------------------------------------------------------------ > > Inventive Designers' Email Disclaimer: > http://www.inventivedesigners.com/email-disclaimer -- jCore Email : avitte@jcore.fr iAnonym : http://www.ianonym.com node-Tor : https://www.github.com/Ayms/node-Tor GitHub : https://www.github.com/Ayms Web : www.jcore.fr Webble : www.webble.it Extract Widget Mobile : www.extractwidget.com BlimpMe! : www.blimpme.com
Received on Wednesday, 10 April 2013 15:58:35 UTC