Nelson B wrote:
> So, since your NR cert has no EKU extension, we have no reason to believe
> that it is not usable for SSL client auth.  It is not a CA cert, so
> cannot be used to sign certs.  It has a key usage that excludes use for
> any sort of encryption.  But it allows NR, which is a type of signature.
> And signature is the key usage required for client auth.  So, we conclude
> that this cert can be used for ANY signature application whatsoever.
> (Some signature applications require NR, but AFAIK, none forbid NR.)

OTOH, usage of the NR certificate might/should require explicit user
approval (might: from the device itself, should: from the application):
It appears that applications associate a "contract-signing" meaning
with the NR bit, assuming that the user is always explicitly aware of
the usage of the NR certificate (otherwise, the user could repudiate
having signed a message, if that mesage was never presented to him).

This is surely inconvenient for SSL applications: you shouldn't have
to authorize signing each individual message if you said "select
automatically" before.

So I think it would be best if the browser detected that there is
a better-suited certificate (one which doesn't need explicit user
interaction); the browser should then also invoke explicit approval
if the NR certificate is used even though "select automatically"
was configured (explaining that this specific certificate is a
formal signature).

Regards,
Martin
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to