Hi Anders,

Thanks for your reply.

As you say TPMs may be used in a bad way.  It is really up to
the "market" to decide what to use TPMs for.  This includes us
as well :)


I completely agree with you here.  Especially since the TPM-enablied
technologies haven't been widely implemented yet into operating systems and
applications.  How exactly they will/should be implemented is unclear.  For
example, the TPM functionality should not be accessible by any user
application.  Also, one widely-circulated issue is tat each TPM has an ID,
which in theory can be used to disallow privacy on the web.  However, if the
implementation does not allow the ID to leave the host platform, then this
wouldn't be an issue.  When I read about TPM technologies and the TCPA
online, it sometimes sadly reminds me of the Salem witch hunt...

If platform attestations will reach TLS or not is of course an interesting
topic and at this stage we can just guess.


It would be interesting to hear some arguments against this happening.  I
personally don't have any.

The reason why I'm a bit
skeptical is really due to the deployment state of TLS client-auth
compared
to various "plugin" methods. The latter has become a necessity due to the
browser vendors' neglectance of a signature solution, which has forced
the development of standalone crypto support (e.g. java) rather than
using the native browser and OS crypto.  These solutions are incompatible
with the native TLS client-auth.


What are the "plugin" authentication methods you refer to, are they also
certificate-based?  Also what do you mean by "a signature solution" - do you
mean that browsers do not have support for digital signature incorporated in
them?  I though that Firefox does - isn't this NSS funcitonality exported to
other Firefox modules through the PSM or other XPCOM interfaces?

Regards,
Peter
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to