- From: Aymeric Vitte <vitteaymeric@gmail.com>
- Date: Tue, 16 Jul 2013 00:57:44 +0200
- To: Arun Ranganathan <arun@mozilla.com>
- CC: "public-webcrypto@w3.org Group (public-webcrypto@w3.org)" <public-webcrypto@w3.org>, GALINDO Virginie <Virginie.GALINDO@gemalto.com>
- Message-ID: <51E47E68.9010201@gmail.com>
Hi Arun,
Some small comments after a quick review (sorry limited time right now) :
- is it on purpose that you are using "==" instead of "==="?
- Code sancity and ... :
.then(function(digest) {if (ok) {} else {get src}},
function(error) {get src})
No?
and get src should be https since you mention the origin is tls
- Webmail :
window.crypto.subtle.importKey("jwk", jwkKey,..) --> window.crypto.subtle.importKey("jwk", jwkKeyObject,...)
Regards
Aymeric
Le 15/07/2013 21:05, Arun Ranganathan a écrit :
> Dear Working Group,
>
> Review of the use cases is encouraged :)
>
> https://dvcs.w3.org/hg/webcrypto-usecases/raw-file/5765a3364579/Overview.html
>
> Thanks to those who have already reviewed things.
>
> -- A*
> On Jul 12, 2013, at 3:42 PM, Arun Ranganathan wrote:
>
>> Hi Karen! Thanks for your careful review.
>>
>>
>> On Jul 8, 2013, at 3:47 PM, Lu HongQian Karen wrote:
>>
>>> Hi Arun,
>>> Thanks again for putting this together. I have a few comments below:
>>> Banking transaction use case
>>> >Jae-sang presents the derived public key to GB
>>> Which derived public key?
>>
>>
>> It shouldn't say "derived." Early drafts didn't distinguish
>> sufficiently between key generation and key derivation. I've fixed
>> this now.
>>
>>
>>> >GB may then use a key exchange mechanism to exchange keys with the server over TLS
>>> Guess you mean GB client (running in the web browser) and GB server?
>>
>>
>> Right. In every use case, I mean with a "user agent" as an
>> intermediary. So everytime I say "GB" I mean, an instrument such as
>> a web page, iframe, or script hosted on GB's domain. In this
>> particular example, ALL transactions occur within GB's domain.
>>
>>
>>> >The signature is verified, and upon successful verfication, is decrypted.
>>> verfication -> verification
>>> is decrypted -> the encrypted message is decrypted.
>>
>>
>> Fixed.
>>
>>
>>> BrowserID use case
>>> >BrowserID
>>> Change to Persona?
>>
>>
>> Good nit! So actually, any reference to the protocol itself is
>> "BrowserID." Persona, generally considered a product, is in fact an
>> implementation of BrowserID. Stricly speaking, that protocol spec
>> lives here: https://github.com/mozilla/id-specs/tree/prod/browserid
>>
>>> >The signed assertion is then combined …
>>> May change to: The javascript ofPersona.org <http://Persona.org/>in
>>> the iFrame combines the signed assertion…
>>
>> Sure!
>>
>>> Does Karen need to login to Persona before Persona can access her data?
>>
>>
>> Yes! The flow is exactly as if you did this:
>>
>> 1. Visit http://myfavoritebeer.org/
>> 2. Log in using Persona
>>
>> What is happening between those websites is what the use case is.
>>
>>
>>> The verification part is confusing to me. Does PSS verifies on the
>>> client side or the server side?
>>
>>
>> EVERYTHING happens on the client side. PSS obtains the public key
>> from https://persona.org/.well-known/browserid (which in fact uses a
>> semi-legitimate form of JWK).
>>
>> -- A*
>
--
jCore
Email : avitte@jcore.fr
iAnonym : http://www.ianonym.com
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms
Web : www.jcore.fr
Extract Widget Mobile : www.extractwidget.com
BlimpMe! : www.blimpme.com
Received on Monday, 15 July 2013 22:58:17 UTC