>If you are going to be using SignText on the client side and wish
>to verify the signed text on the server side, you may want to
>consider signing the text into an XMLSignature document & using
>readily-available XMLSignature libraries (JWSDP, Apache) for the
>verification.

A problem with this approach is that signText generates PKCS #7
signatures which are different (=incompatible) to XML Signatures.

If you can accept non-standard XML Signatures there seems to
be a way ahead:
http://lists.w3.org/Archives/Public/w3c-ietf-xmldsig/2006JanMar/0008.html
A snag is that you don't really want to sign XML, but rather
"a screen display of something comprehensible".

>The advantage of using XMLSignature is that you can then parse
>out the signed text with other readily-available libraries and
>save them into databases (including XML databases) easily.

signText only offers signing of plain-text.  There are many real-world
(= implemented) e-gov applications that require more than that,
not to mention uploaded attachments.

Due to the availability of several Java applet-based Open Source
signature solutions that do not limit you to Firefox, plain-text,
and PKCS #7, I would personally not bother with signText.

Anders Rundgren

Pablo Andrade wrote:
> 
> I would like to ask you, if is there a solution out there so you can verifiy 
> a signature on the server, or it has to be developed from scratch?
> 
> We have a e-goverment solution, who signs/verify plain text documents at 
> client side using CAPICOM. Now we are trying to use Firefox/Linux as an 
> alternative to IE/Windows. We think Crypto.SignText from Mozilla could be a 
> start, but we still have the verify problem.
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto


_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to