I have not seen this in real life but apart from the security issues,
I believe this concept has usability problem as the crypto service is
likely to be the viewer as well.  At least this is how it has been done
in Austria.

They are BTW indeed using 127.0.0.1 and some strange port.

Assuming that the PC (or similar) has reasonable integrity,
I don't see much problems using a native browser plugin.  If
the PC is full of viruses and spyware, it is not only useless for
signatures but for any kind of work.

I also firmly believe that authentication is a much more critical
application as there is no way you can rollback these.
If I insert my eID card in a PC and perform an authentication,
a keyboard logger and spyware daemon may from that moment
authenticate in the background to different services, stealing
information that may be my own or my organization's.  Here I
remain optimistic because we will soon have TPM-enhanced
mobile devices that can thwart this situation in several ways like
never doing a auth/sign op without going trough a GUI as well
as allowing particularly sensitive operations to be performed
in the mobile device environment only.  Although a pipe-dream
back in 1998 when I started to look into this, now it is actually
happening :-)

Anders

----- Original Message ----- 
From: "Kyle Hamilton" <[EMAIL PROTECTED]>
To: "Anders Rundgren" <[EMAIL PROTECTED]>
Cc: <mozilla-crypto@mozilla.org>
Sent: Tuesday, February 14, 2006 08:23
Subject: Re: Italy: Yet another OpenSignature standards effort


This could easily be built into the Cryptographic Services service or
something -- if it's code that comes from the vendor, it's easier to
trust than code that doesn't.

The problem is the addition of another attack vector, and having to
authenticate to it (unless the process can look at the TCP connection
list and see what process opened it, then get the credentials of that
process to see who it's supposed to impersonate).  This could be
mitigated by having it only listen on 127.0.0.1 on some strange port,
but it's still not that great.

I would rather have another virtual machine entirely running on the
same hardware, but that's something of a pipe dream.

-Kyle H

On 2/13/06, Anders Rundgren <[EMAIL PROTECTED]> wrote:
> http://opensignature.sourceforge.net/english.php
>
> These guys have concluded that Java applets are bad and that you
> should exclude the browser altogether by using something called
> URL Programming Interface, which in essens hosts a local web-server
> for handling the crypto and signature stuff.
>
> I believe this is similar to the Austrian scheme, although a bit less 
> documented.
>
> Personally I think Java is good as a short-term solution but useless in
> the long-run as Microsoft would never support a Java-based standard.
> The need for accepting native and trusted code during browsing is also
> something that does not seem to be ideal.
>
> Anders R
>
> _______________________________________________
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to