On Mon, Apr 6, 2009 at 8:37 PM, Ian Hickson <i...@hixie.ch> wrote:
>> Submission formats:
>>
>> The default format, introduced by Netscape, is the SPKAC format, see the
>> above link, and includes the public key and the Keygen challenge
>> attribute, and is signed by the private key.
>>
>> The actual standardized format is PKCS #10, in form a more advanced and
>> flexible version of SPKAC (it is the format used to request certificates
>> for webservers), and I am not sure if this is now used by default in
>> some clients. In Opera this format can be selected by using a
>> type="pkcs10" attribute in the keygen tag.
>
> I haven't added support for PKCS10 since it doesn't seem to actually add
> anything to the feature set.

...except one marketing checkbox: "Compliant with the Public Key
Cryptography Standards".
>>   - An algorithm preference list, specifiying the key algorithms
>> preferred by the server, in order of preference. In this case a keyword
>> registration process should also be defined. Initial keywords should
>> cover RSA, DSA and Elliptic Curves. As some methods may require
>> parameters to be transferred to the client the syntax should cover such
>> extensions, e.g "alg1;param1=x;param2=y,alg2", name of parameters should
>> be selected by the specification for the algorithm, but two parameters
>> should be defined: Minimum length (e.g. "min-len") and Maximum Length
>> ("max-len") of the key that can be used to guide the client in what
>> keylength it should selects (These should be suggestions, not absolute
>> limits, at least for the maximum; the minimum should probably be
>> considered a lower limit)
>
> I haven't added this, because right now the only browser I could find
> which supports more than one algorithm is Firefox, and it just has two
> (RSA and ECs, as far as I could tell).

RSA and DH/DSA are in almost everything.  Besides, insisting that the
browser itself hold the keys is counterproductive.

>> It is also conceivable that the server should be able to specify which sites
>> the certificate can be used for. A common usability problem with client
>> certificates in SSL/TLS is selection of certificate, particularly when you
>> have many certificates. A list of hostname:port pairs would probably be a 
>> good
>> way to ease that (the SSL/TLS server can also specify which CAs it prefers to
>> the certificate was issued by, but nobody is currently using that 
>> capability).
>> A list of such sites provided at generation time might help the user in cases
>> where the SSL/TLS server does not specify preferred CAs.
>
> It seems like we should encourage people to use the existing feature you
> mention rather than adding more features to do effectively the same thing.

The "existing feature" is a list of external authorities that the site
trusts, rather than necessarily showing "all".

>> In the future it is also conceivable that such requests is to be made
>> for keys stored on smartcards, so a source selector might be an idea,
>> perhaps also with the capability to specify specific cards.
>
> I'd rather we didn't specify this before it was ready to be a reality.

I'd rather it be specified before it's ready to be a reality, to
provide marketing pressure for "hey, we've already got support for
it".  Otherwise, it's a chicken&egg problem.

-Kyle H
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to