(lo-pri interest only requests)

On 18/04/12 20:00 PM, Anders Rundgren wrote:
On 2012-04-18 11:04, helpcrypto helpcrypto wrote:

Container attestations must be performed at the APDU-level since
E2ES cannot be "abstracted".

I dont understand that.

See section 9.5 of:
http://forja.cenatic.es/docman/view.php/160/684/cwa14890-01-2004-Mar.pdf

I have taken another path than ISO/CEN but both concepts stem from the same 
root:
http://openkeystore.googlecode.com/svn/trunk/resources/docs/Efficient-Provisioning-of-Complex-Structures-Over-Unsecured-Channels.pdf

As can be seen from the documents, Secure Messaging isn't something you could
bring up on a typical cocktail party :-) :-)


Hmm... I haven't read your cocktail books above, but do you have a minimalist recipe? What's a Secure Message? In explanatory terms.

...
Are we actually talking about the same thing here?  I'm talking about
exposing cryptographic APIs to code running in an arbitrary web page.
This is what CertEnroll does and that is an *extremely* bad idea.

Consider: I want a user to be able to request a certificate on our
company smartcard.
Is that an "*extremely* bad idea"?


(to me, that question makes no sense. users can't talk to smart cards. Only smart card readers and programs can. So what smart card reader and what program is doing this? A dumb smart card reader and a browser, following Javascript instructions from a website? That'd be game over...)

...
Compare this with HTTPS which can be invoked from any page without
exposure of a single cryptographic method.  That's a good system.

I really this understand this. You think "a protocol" is the solution?

Almost.  I started years ago with a protocol and later realized that
secure messaging must be a part of that.

curious ... (smart card) money products also work this way. That is, at its base layer, peers talk with secure messaging. Once you've got that layered in as the core design, the rest is easy (handwave handwave)... they problem is that most designs don't get that right, and struggle.

Although, maybe I'm reading more into "secure message" than is meant.

However, given the weirdness
of smart cards, I found that you would also need a carefully matching
container in order to ever get it supported inside a standard browser.


Well, using my view of a secure message, the conceptual browser can't be a peer. So all it can do is do packet routing.

But, real-world browsers don't do that, they pretend to be the only peer, and that's where the trouble starts.



iang
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to