Hi Adrian,

Thank you for the prompt response.

I believe that <keygen> only represent the tip of an iceberg because the fact is that in the EU banks and governments are spending huge sums on developing proprietary and national replacements of the local PKI-client in browsers because the latter are not only all over the map; they do not support things like on-line signatures.

The following is a recent example of maybe 20 different efforts of this kind:

http://egovlabs.gv.at/projects/mocca

I.e. even if <keygen> would be standardized (and adopted by Microsoft and other leading browser vendors...), it would not make any difference for the major users of PKI since /they still would need to deploy their own stuff/.

There is though one area which /desperately/ needs a standard "<keygen>" and that are mobile phones. Why is that? It is because unlike for PCs where most serious users of PKI use with smart cards that are physically distributed, mobile phones lack such a possibility, because SIMs are tied to operators and are thus generally useless as key-containers.

The real problem here is that this issue spans multiple "departments" and "platform owners" which so far has lead to a decade-long stand-still. My guess is that this effectively makes it unreachable from a traditional standardization perspective. I believe Microsoft's introduction of InformationCards was a very good way of introducing new technology which was a bit similar to WHATWG did with HTML5 (i.e. code + specs in a rather non-formal way).

FWIW, I'm personally involved in creating a de-facto standard for on-line provisioning. Unlike HTML5 I have spent considerable time investigating and listing "requirements" for such a facility with on-line banking and e-government services for consumers/citizens as the primary (but not only) targets. It has recently morphed into an eight-pass (!) XML protocol which is an indication that a single HTML tag probably doesn't fill the bill.

That <keygen> doesn't allow a bank to set PIN-code or PIN-code policy is just a starter since this innocent-looking requirement actually has major implications, even including core platform cryptography: To my knowledge this is outside of CertEnroll/Xenroll as well since the underlaying standard Windows CSPs do not support PIN settings or PIN-policies, at least not in a consumer setup. The latter should be interpreted as /multiple and independent issuers all having their own ideas about policies/.

Sincerely,
Anders Rundgren
Senior Security Consultant


Adrian Bateman wrote:
On Saturday, August 08, 2009 12:50 AM, Anders Rundgren wrote:
http://lists.w3.org/Archives/Public/public-html/2009Aug/0389.html

However, that doesn't make Microsoft's solution ideal either because it
also fails to address provisioning in a way that is even remotely
comparable to what current card management software offers.

Hi Anders,

Thanks for the mail and the forward to the lists in the CC line.

I certainly wasn't trying to make a claim that Microsoft's solution is ideal - this 
isn't my area of expertise so I wouldn't be able to judge that. I have forwarded your 
mail on to a team better equipped to give feedback. My question was, based on the 
feedback I'd heard, whether or not it made sense to standardize the old 
<keygen> behaviour in HTML 5 when a more modern solution might be more 
appropriate.

I will follow-up here when I get more feedback from the team that looks after 
this area.

Regards,

Adrian.



-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to