September 27, 2009 07:05 Nelson B Bolyard wrote:
>> To me cluelessness seems to be all over the map since nobody (including 
>> the people subscribing to this list), have bothered the least about what
>> this thingy is supposed do, and how, and why.

> I'm sorry if you feel cluelessness abounds.  Let me try to help.

You are very welcome!

>> I (incorrectly) thought that everybody in computer security knew that
>> tokens usually are protected by PIN-codes, but <keygen> does not deal
>> with such.

> The PKCS#11 model of tokens does not have a PIN per key, but rather has a
> PIN per token. 

Since there are cards with multiple keys and having a unique PIN
for each key, I guess the PKCS #11 workaround/mapping scheme is to
have multiple slots, where each slot contains a token with a single key?

Seen from a <keygen> point-of-view the API should be of secondary
interest as long as it can be mapped to achieve the desired functionality.

> The PIN size limits (min, max) are not set at the time that
> a key is generated but rather at the time that the token is initialized.

This is one of the reasons why I play with the idea that key provisioning
is a use-case of  its own that should be better off with a separate API,
and only use legacy APIs for using keys.  My current scheme contains
about 40 provisioning methods that I think would be more than difficult
to get support for in the PKCS #11 community.

>> I guess the idea that it is up to the user to decide what the policy
>> including selecting "key strength".  I have a feeling that there aren't
>> too many banks or governments out there that would buy into this.

> Have you seen any UI that gives the user a way to make that decision?
> It's a decision made at token provisioning time.  Banks and governments
> provision their tokens with the limits they choose.

This is where the <keygen> discussions seem to go wrong.  If an on-line
provisioning facility cannot set and enforce policies like you can on centrally
produced tokens, the motives for using the on-line method becomes zero.

>> Don't get me wrong, <keygen> was a necessity for Netscape in order to 
>> roll out their brilliant contribution to Internet security, the SSL
>> protocol. Today the situation is rather different but many solutions are
>> still at the 1997 level.

>And other proposed solutions are still at the wannabe stage years later.

Absolutely :-(  However, it is actually much worse than you describe :-( :-(

If you do a little EU on-line bank e-government market research you may find
what I found: <keygen> and its cousins have in most cases been replaced by
proprietary solutions that address *one* provider's policies.   Wasn't the USPTO
doing something like that on your side of the big pond?

I just got this from a Microsoft PM:

   "From my side, getting the right key or a cert is just half the battle. The 
lifecycle 
   of that key/cert pair is at least as hard of a problem. For example, if a 
Bank 
   takes a user through a rigorous process to provision them with a key that is 
   good for let's say a year. How can you renew it later? Do you need to go 
   through the process again? Can your system know ahead of time that they 
key/cert 
   are about to expire and proactively get another one? What if you don't login 
to your
   Bank's website for a while? What do you do when a card is full?"

I consider this pretty insightful.

Related reading:
http://webpki.org/papers/mobilephone-pki-options.pdf

Regards,
Anders

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to