>> Security-wise there are no differences, assuming appropriate methods are 
>> used.

>Well there is a form drop down to create client certs, why can't there 
>be something similar for choosing client certs to auth inside the form 
>(and some kind of hint method to tell if there is any suitable available)?

I think you misunderstood my statement or that I was very unclear.  I was 
referring to SSL-client-auth versus the methods used in [the growing number of] 
"competing" authentication schemes that works on top of an 
SSL-server(only)-authenticated channel.  Since SSL gives you a two-way 
encrypted channel, you indeed get protection from MITM attacks performed at the 
network level.  If not every proxy server, router, switch, or hub would be able 
to read sensitive session data.

There is though a general weakness in schemes that do not terminate the 
client-side in the SSL channel and that is the specific form of MITM attack 
known as real-time-phishing.   But this deficiency is eliminated by "targeting" 
the client-side operation for the site and certificate in the server-end.  By 
doing that the receiver (server), can immediately detect if the operation has 
gone through a phishing proxy or not.  It is an extra test to do but rather 
simple.

For client-cert selection it would be nice if it worked identical for auth and 
signature operations and this is in fact what the majority of the proprietary 
PKI add-ons accomplish today.  I doubt that this will be rectified until/if 
signature and auth schemes get a better integration in browsers.  But that is 
still only the tip of the ice-berg.  On-line provisioning is also a candidate 
for a radical improvement.  One of the reasons why many people put faith in 
Microsoft's CardSpace (formerly InfoCards) is that the entire scheme has been 
built from scratch, rather than readying on dated PKIX standards in proprietary 
dressings (includes FF and IE).  CardSpace builds on user-centric methods 
intended to work for consumers that do not know what a certificate is and 
probably never well.  CardSpace is another [well-deserved] blow at PKI.

Anders
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to