Mikolaj Habryn wrote:
Is this intentional? It's slightly inconvenient for my purposes, since I
absolutely don't care who the user is on the other end and whether or
not they have a client certificate signed by a real CA. I just want a
new user to be able to create a cryptographic ID for crypto.signText on
the spot.

Your use case is quite unorthodox, and is at risk of being criticized as such.

See, you say the above but OTOH you also say :
pushing the private key at the
server right at the start rather throws the whole non-repudiability
thing in doubt :)

So, it seems quite contradictory to hope to get non-repudiation if you don't care who the user is. I can tell you at least the european regulation sets as a mandatory step for NR (more precisely for burden-of-proof reversal) that the certificate used has been issued under very strict conditions, so that the user can no more deny it's his certificate (the underlying point for certificates agnostics is to prove it's his private key) that he can deny having signed.

A private key can not have more value than the process used to issue it.
(consistant use of a given private key can progressively give it value, but it's something that hardly enters the legalese world)

But let's get back to your basic problem :
I'm also slightly worried about requiring people to trust a CA that
exists to blindly sign things. Is there a safe combination of trust bits
and/or usage bits imposed by the CA that will allow crypto.signText to
work but prevent any dramatic misbehaviour?

In fact I agree that it's not the most common but a valid case to be able to use a certificate to sign or authentifiate yourself even if you don't want to mark this CA as trusted for any usage. So this is a bug.

Meanwhile what you should be able to do is to mark the CA only as trusted for email which limits the risks.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to