On Sunday, January 29, 2017 at 8:36:57 AM UTC+1, Anders Rundgren wrote:
> Feel free calling me a troll, but there is a rationale behind my ramblings on 
> https://bugzilla.mozilla.org/show_bug.cgi?id=1065729
> 
> The bug is named "Implement the FIDO Alliance u2f javascript API".
> 
> The spec is here: https://www.w3.org/TR/webauthn/
> 
>   "In one extreme case, the authenticator may be embedded in the client,
>     and its bindings may be no more trustworthy than the ClientData.
>     At the other extreme, the authenticator may be a discrete entity with
>     high-security hardware and software"
> 
> Anyway, what I (early on) suggested was not deprecating the USB token 
> project, but looking into the possibility offering a soft token solution as 
> well.
> 
> Then suddenly, Mozilla announces that they indeed have a soft token 
> solution(!) which they don't want to productify since that would potentially 
> give them "badwill" since that solution would be less secure than the "real" 
> solution.  800 million Chinese folks using soft payment tokens seem to have 
> survived.
> 
> Now to the "funny" part.  Mozilla, Google, and Microsoft have spent huge 
> resources on defining and implementing a standard called WebCrypto.
> 
> AFAICT, this scheme should have close to identical security characteristics 
> to a soft U2F solution!
> 
> I believe that it would pretty inconvenient for Google who is the engine 
> behind U2F, to screw all their HW partners by offering a soft solution.  
> Mozilla does not have this problem.
> 
> This is not a question about security, but about product management.

Would it be possible getting some kind of feedback on my claim regarding the 
security of WebCrypto versus soft token U2F?
_______________________________________________
dev-platform mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to