>Kyle wrote
>> As for Firefox, the only thing which can be used via JavaScript is
>> signtext.  If there were a crypto object in the DOM which could
>> support more than just signtext, it would be quite nice -- but there
>> isn't one as far as I've been able to tell.  (I have not looked that
>> closely, however.)

Peter D wrote:
>I'm surprised.  Are there any plans to export more of the functionality
>through the PSM module or in any other way?

Actually the problem is [quite] a bit trickier than exporting APIs.

A browser can be regarded as a Virtual Machine (VM), typically
running *untrusted* application code (e.g. downloaded HTML pages),
in a sandbox mode.

Cryptographic libraries are OTOH programmatic interfaces
supposed to be called by *trusted* applications.  AFAIK, neither
the concept of an interactive user or a display is a part of such.

That is, what is missing is not really an API, but a secure "bridge"
between the user, GUI, browser and the crypto libraries.  "signText ()"
is a minimal version of such a bridge.

Missing US Government requirements
The reason why this is not happening is that there are no requirements
from the US government for signature support in browsers.  The
disparate governments in the EU and Asia (who have such requirements),
are unable to run this as a united effort.  This is hardly surprising because
such missions are outside of the scope of most governments.   That the
US government is a crucial player in this space is due to the dominance
of the US SW industry, as well as their use of English :-)

PKI is [still] a "research" topic
In addition, there is a lot of confusion in this space when you start to
design systems which makes it hard to come up with a specification.
http://w1.181.telia.com/~u18116613/A.R.AppliedPKI-Lesson-1.pdf
http://w1.181.telia.com/~u18116613/A.R.AppliedPKI-Lesson-2.pdf
If you (all) have a solution to these questions that use true E2ES
(End-To-End-Security), I would like to hear about this!  So far
nobody have dared to *publish* how such a system would work.
That this has implications is because it affects "what to sign"; the
actual transaction, or just a locally stored "assertion" associated
with the out-going transaction.  To sign the actual transaction
would require the browser to handle any number of protocols
and formats, as well as doing message encryption.  IMO, such
a thing will never fly.  Therefore I have in my related WASP
work, made signining transactions directly, as out of scope.
That this [in the eyes of some people] violates the core of PKI is
something I consider of little importance since the assertion method
is the de-facto standard in practically all existing pre-PKI transaction
schemes.


Anders R



_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to