On 2012-04-18 11:04, helpcrypto helpcrypto wrote:
> On Wed, Apr 18, 2012 at 10:03 AM, Anders Rundgren
> <anders.rundg...@telia.com> wrote:
>> Dear "helpcrypto", now it became a little bit messy because I'm talking about
>> principles while you are talking about specific interfaces like NSS, and 
>> PKCS #11.
> 
> Ok. Rather than discussing technical or theorical point of views, i
> think we could start focusing on "what the user need and how can we do
> it" possible(design/implementation).
> 
>>> During enrollment, i need to know card is present and the keypair is
>>> generated inside. how can i achieve this without a pkcs#11 interface?
>>
>> None of the popular cryptographic APIs support container attestations.
>> None of the PKIX enrollment protocols support container attestations.
> 
> Using CryptoAPI you can select which CSP to work with, and a CSP can
> point to a specific smartcard.
> If the keys are generated inside the card i dont need a PKIX
> enrollment protocol that support anything special, cause im sure the
> keys are generated on the right place.

My scenario is a billion+ community who haven't a clue what a CSP
is and never will.  They may not even know what a certificate is!

A CSP-solution doesn't give the issuer any information about where and
how a key was generated.  The same goes for NSS, JCE, and PKCS #11.


>> Container attestations must be performed at the APDU-level since
>> E2ES cannot be "abstracted".
> 
> I dont understand that.

See section 9.5 of:
http://forja.cenatic.es/docman/view.php/160/684/cwa14890-01-2004-Mar.pdf

I have taken another path than ISO/CEN but both concepts stem from the same 
root:
http://openkeystore.googlecode.com/svn/trunk/resources/docs/Efficient-Provisioning-of-Complex-Structures-Over-Unsecured-Channels.pdf

As can be seen from the documents, Secure Messaging isn't something you could
bring up on a typical cocktail party :-) :-)


> Again: lets try (both) to leave the theorical/technical, and think in
> what the user needs.
> 
>> Are we actually talking about the same thing here?  I'm talking about
>> exposing cryptographic APIs to code running in an arbitrary web page.
>> This is what CertEnroll does and that is an *extremely* bad idea.
> 
> Consider: I want a user to be able to request a certificate on our
> company smartcard.
> Is that an "*extremely* bad idea"?

If it works like "CertEnroll" or "SConnect" it is indeed an extremely
bad idea because it exposes the card to accesses by untrusted parties.


> If you think is not, lets focus on the problem itself: how to request
> a certificate within a smartcard
> If you think is it...could you tell me why?
> 
>> Compare this with HTTPS which can be invoked from any page without
>> exposure of a single cryptographic method.  That's a good system.
> 
> I really this understand this. You think "a protocol" is the solution?

Almost.  I started years ago with a protocol and later realized that
secure messaging must be a part of that.  However, given the weirdness
of smart cards, I found that you would also need a carefully matching
container in order to ever get it supported inside a standard browser.


>> I still don't understand the Spanish use-case and particularly not
>> why you need card-level Secure Messaging for signing data.  I guess
>> it is also about the server authenticating to the card?
> 
> Seems the DNIe doesnt help to clear the problems im having. Forget the
> example and try to focus on the "detect anc work with the smartcard"
> issue.

Regards,
Anders
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to