I believe that a requirement that the signer certificate must be trusted (in a 
trusted CA
store?) is entirely wrong as it makes the whole scheme non-portable.  There are 
NO
requirements in FIPS-201 and similar that you must have a CA certs and that
they must be installed from the card in some magical way.

     This is indeed a bug.

BTW,  is SSL-client-auth also broken?  I assume not, otherwise there would have
been quite a number of complaints.

Most signature systems on the market suppport certificate filtering in simikar 
ways to
SSL.

Anders Rundgren

----- Original Message ----- 
From: "Jean-Marc Desperrier" <[EMAIL PROTECTED]>
Newsgroups: mozilla.dev.tech.crypto
To: <dev-tech-crypto@lists.mozilla.org>
Sent: Saturday, April 08, 2006 11:20
Subject: Re: certificate requirements for crypto.signText


Mikolaj Habryn wrote:
> Is this intentional? It's slightly inconvenient for my purposes, since I
> absolutely don't care who the user is on the other end and whether or
> not they have a client certificate signed by a real CA. I just want a
> new user to be able to create a cryptographic ID for crypto.signText on
> the spot.

Your use case is quite unorthodox, and is at risk of being criticized as 
such.

See, you say the above but OTOH you also say :
> pushing the private key at the
> server right at the start rather throws the whole non-repudiability
> thing in doubt :)

So, it seems quite contradictory to hope to get non-repudiation if you 
don't care who the user is. I can tell you at least the european 
regulation sets as a mandatory step for NR (more precisely for 
burden-of-proof reversal) that the certificate used has been issued 
under very strict conditions, so that the user can no more deny it's his 
certificate (the underlying point for certificates agnostics is to prove 
it's his private key) that he can deny having signed.

A private key can not have more value than the process used to issue it.
(consistant use of a given private key can progressively give it value, 
but it's something that hardly enters the legalese world)

But let's get back to your basic problem :
> I'm also slightly worried about requiring people to trust a CA that
> exists to blindly sign things. Is there a safe combination of trust bits
> and/or usage bits imposed by the CA that will allow crypto.signText to
> work but prevent any dramatic misbehaviour?

In fact I agree that it's not the most common but a valid case to be 
able to use a certificate to sign or authentifiate yourself even if you 
don't want to mark this CA as trusted for any usage. So this is a bug.

Meanwhile what you should be able to do is to mark the CA only as 
trusted for email which limits the risks.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to