http://www.gsmworld.com/newsroom/press-releases/2010/5726.htm

As I said a million times before, on-line provisioning of HW tokens
is the future.

My take on this subject is (still...) defining a standard container based
on "Open Hardware" because E2ES (End to End Security) cannot be
abstracted (due to MACs); it is concrete by nature.

That you as a "side-effect" gets a unified driver as well may turn out
as the most significant thing in the end.  Who (in their right mind...)
*likes* smart card middleware?

Due to the E2ES requirements, relics like "CertEnroll", <keygen>,
and generateCRMFRequest() will hardly be around five years from
now but there will be a veritable war regarding their replacements.

Regarding NSS (which I have no deeper knowledge of), I wouldn't be
surprised if most of the contenders will come to the same conclusion
as I have which is that "Using" keys and "Provisioning" keys are quite
distinct, and therefore do not particularly gain by being cast in a single
API like PKCS #11, at least not if on-line E2ES is to be honored.

PKCS #11 is probably OK as is, while on-line provisioning is more like
starting at square one :-)

thanx,
Anders

--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to