2010/3/7 Eddy Nigg <eddy_n...@startcom.org>:
> On 03/07/2010 04:01 PM, Martin Paljak:
>>
>> The reason of "central certificate stores" for software keys is
>> universality and API. Windows provides an API, Mac provides an API, Firefox
>> implements only PKCS#11.
>>
>
> PKCS11 is a standard and I suspect that it's possible to interact with those
> crypto stores through PKCS11. APIs may be invented and changed by various
> software, which mostly don't follow any standard.

Windows is also a (de facto) "standard" which you can't ignore. Same
goes for OS X. There's no point in discussing "standards" if you want
to produce an .exe that works with Windows Vista (and whatever
standard or non-standard glitches and quirks it has) or discuss
replace the GUI on Mac OS X for a "standard" GUI (X11?). Windows (and
whatever APIs it provides) is a standard (for applications that run on
windows), OSX with its APIs is a standard (for mac apps). Yes, there
is POSIX and whatnot, but that's mostly on the paper. For Fedora, NSS
is the "crypto standard", for others it is OpenSSL. Windows and Mac
are not like Linux.

Discussions (and implementations) which layer should be the topmost
(PKCS#11->CAPI or vice versa, CDSA->PKCS#11 or vice versa) have not
yet been usable or practical, to my knowledge. Conceptually it should
be possible, in real life matching the corner cases becomes difficult
if not possible. Last time I checked the PKCS#11 module that came with
OS X that should translate at least Tokend (smart card) drivers to
Firefox ... just crashed.

It is not about APIs, it is about "how it should be done" and what it
is you're trying to do. Why the file open dialog tends to come from
the OS platform?

>> The fact that platform APIs are not used (or the argument that they work
>> poorly or something similar) is something Mozilla people should answer to.
>>
>
> Well, the arguments were usually exactly the point I made. Firefox (and
> other applications) have their own crypto store, making it independent from
> what happens at the system level. There are obviously pros and cons for this
> approach.

One of the major cons: you need to multiply the I in PKI. The same way
Firefox makes you depend on the root CA selection done by somebody
else, it would be OK to make the user depend on the PKI interfaces
(and trust management) of the platform, if the platform provides one.
For me soft certs on both mac and windows, with firefox, feel like
split personality (all this importing-exporting for no obvious reason)
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to