Sir:
Anders Rundgren wrote:
Nelson B Bolyard Wrote.
This demonstrates that standardization is an option but an increasingly
difficult option as well in an ever faster-moving world:
http://www.w3.org/2009/06/xhtml-faq.html

Does it?

It appears to me that this is the standards body pruning the tree of
html offshoots, recognizing a single standard for the "XML serialization
of HTML".

That's correct.  But as I have understood it, HTML5 came from the "outside"
through WHATWG and effectively killed W3C's "internal" (X)HTML effort.

Now, I seem to recall that one of your complaints about the
world of crypto is the lack of standardization of methods (e.g. scripting)
for certain functions.

Well, I primarily of question the *huge* investments that are done by EU banks
and Governments for replacing or enhancing the client-side PKI implementation of
current browsers with proprietary stuff.   Technically they had no real option 
though.

I had naively hoped that for example Mozilla would be interested in getting 
some of
this money in exchange for spearheading work in this space.  Having a platform 
that
runs on most computers makes Firefox an excellent "vehicle" for such 
developments!

Unfortunately, In spite of big efforts (papers, conferences, and a gazillion of
e-mails), I have to date not found a single person within Microsoft or the
Mozilla community who are interested in the more architectural aspects of
secure on-line banking and e-government services for the web.

Anyway, I started 2003 with the idea that I should try to standardize "web 
signing"
but I have swapped "standardization" for Open Source.  Lately I've found a much
more important area than signing and that is key provisioning and management.
This is truly virgin territory!  The current work spans from soft certificates 
in browsers,
to hardware-protected keys in mobile phones.   In addition, there is a new
token architecture that by adding $1-$2 to the list-price of USB memory stick
will enable consumers to have a mobile "key.db" making their PIV/CAC/eID
cards appear quite limited (like addressing 5% of your Internet auth needs).

That for example Microsoft launched their pretty nice Information Card scheme
as running code + spec + support to Open Source and waited more than two
years with a formal OASIS TC is an indication that I'm not alone in believing
that introducing *radically new* things the old way has simply run out of gas.

Happy 4:th wishes
Anders Rundgren
Reasonably good engineer, lousy salesman


I assume that you been following IETF RFC on the Crypto subject. They just released a series of RFC on management of keys. As you know, keys are used in all layers of the OSI ref. stack in some form of security protocol. I think we should follow the IETF lead and implement those concepts that fit within SASL or TSL or MINE, etc., The application layer stuff as defined by IETF. There is no point in trying to be universal, because that is impossible. Also note the Trusted Computing Platform work. At present, no operating system is FIPS140-2 level two or better without some hardware support. Where do you wish to take this? Note I am not a programmer, just a lurker. At present those crypto USB keys are used in a Kerberos corporate environment to id individuals. That is as far as I would extend their use (but then one is more likely to find Trusted Computing Modules on Corporate machines where the decrypting key would be a local corporate key embedded in TCM). Speaking of Kerberos, do you know if GSS-API in Mozilla has been extended to support channel bindings, if supported in Ipsec? So you say, where does this fit into WEB signing? You cannot sign web sites without keys and some way to check them securely (that the management part). You know In my mind, I equate Kerberos with authentication of individuals, SASL with authentication of applications or users (roles aspect), TSL with authentication of servers (running code, not machines), and IPsec with authentication of hardware (machines). Ipsec is outside Mozilla code responsibility (other than checking channel bindings). So what is this WEB signing? And where does this fit in the scheme of things? NOTE Oasis and IETF are working together on common issues. Does HTML5 cover any of the issues you'd like to see covered?

--
Bill
<Thanks, a Million>
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to