Recently there has been some discussions in the IETF PKIX list regarding future 
enrollment systems including those in browsers.

I remain confident that it is infeasible extending such a scheme to include 
smart cards since Certificate Enrollment and Token Provisioning are very 
different, even if the latter would only be about PKI.

You don't have to go very far to verify this claim: Just setting a PIN-code 
usually requires "administrator" permission to the token and that is contra to 
what banks and similar providers would be
interested in.

AFAICT, a scalable approach should be based on that the issuer establishes a 
secure session with the token in which it can enforce its own policy _/without 
elevating user or middleware privileges/_.

I have (FWIW), completely dropped the idea of creating a new browser 
Certificate Enrollment protocol since it wouldn't solve any problem.  Well, 
minor adjustments of <keygen> could be useful (such as
making the key strength buttons optional), but that has nothing to do with 
Token Provisioning.

http://www.ietf.org/mail-archive/web/pkix/current/msg29682.html

Anders
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to