Just to make it sure what *I* mean with smart card support:

It does not mean supporting something that is packaged
in a card-like container or in a USB stick, but a cryptographic
mechanism that protects keys from direct external access
through software or through other means (within reason).

For an issuer it is important to know that keys are in such storage
and AFAIK the only way that can be assured in a reasonable way
is that the container itself contains a private key and certificate
which is used for attest-signing generated keys.  If the entire
request must be done HW is a matter of policy which KeyGen2
is mum about.  Current "real" smart cards do not generally
support embedded attest keys but TPMs may do.

That is, if the issuer doesn't recognize the container it will
most likely abort the rest of the process.

Here is a "smart card" of my choice:
http://webpki.org/papers/keygen2/keygen-gui-detail-1.html
The above shows the typical viewable result after running
3 of the 6 protocol steps (plus user-authentication which can
be arranged in any "webbish" way).

A "soft token" of the future may look something like the following:
http://webpki.org/papers/keygen2/sql-databases-as-universal-keystores.pdf

Then the ability to specify PIN policies by an issuer is nice to have:
http://groups.google.com/group/mozilla.dev.tech.crypto/browse_thread/thread/29dc5d1571421f95

Upgrading existing Mozilla schemes to this level is maybe
doable but I won't try it.

Naturally this is not an easy match, it will take years to accomplish
and it may fail [hard] as well :-(

Anders
_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to