Are you effectively saying that you use crypto for signing financial transactions, and the PIN is used for authenticating the user but not involved in the actual signature/crypto algorithm? Therefore, if a user finds a way to invoke the same crypto without providing the PIN, they can effect financial transactions without being authenticated?

Because tbh that sounds like a serious malware threat vector that you should fix in some way where it is theoretically impossible (rather than just practically difficult because of smoke and mirrors with native/NPAPI code) for the system to issue a signature without the PIN.

IOW, fix your crypto, and all the other problems will go away as a consequence.

~ Gijs

On 12/10/2015 12:13, harang.pe...@bell.co.hu wrote:
Hi,

We are working for a bank that implements a plugin for signing login
and transactions in an e-banking solution. This is a key part of the
application, it supports the three major browsers (FF and IE through
npapi, Chrome through native messaging). When we investigated the
problem half-a-year ago, the FF implementation of the Crypto API was not
suitable, since the most important use-case (for each operation, PIN has
to be entered) could not be enforced.

Therefore, we still use the plugin to do all the stuff necessary for
signing transactions, and managing functionalities (PIN change, etc).

If any of you have some wisdom regarding this matter, please advice,
it will be much appreciated.

Thanks,

Peter


_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to