> My scenario is a billion+ community who haven't a clue what a CSP
> is and never will.  They may not even know what a certificate is!
>
> A CSP-solution doesn't give the issuer any information about where and
> how a key was generated.  The same goes for NSS, JCE, and PKCS #11.

Developer *can* know where keys were generated, cause keys are
generated for an specific CSP.
In other words: I (as a developer) select my CSP (which i know it maps
to a card) and generate keys -> keys are in the card.
Anyhow, this is technical discussion, and thats is what i want to avoid.


> See section 9.5 of:
> http://forja.cenatic.es/docman/view.php/160/684/cwa14890-01-2004-Mar.pdf

I know what SM messages are. I didnt understand "container
attestation". (As you already know, its my lack of english :P)

> http://openkeystore.googlecode.com/svn/trunk/resources/docs/Efficient-Provisioning-of-Complex-Structures-Over-Unsecured-Channels.pdf

Isnt that the same slides you already gave me?

> As can be seen from the documents, Secure Messaging isn't something you could 
> bring up on a typical cocktail party :-) :-)

What kind of bloody insane naughty and lusty parties you go?
(Can i go with you?)


> If it works like "CertEnroll" or "SConnect" it is indeed an extremely
> bad idea because it exposes the card to accesses by untrusted parties.

So, a webpage should not be able to query smartcard (and get public
key from a card).
Cant we control that with a "this site is requesting smartcard access:
allow/deny?"

> Almost.  I started years ago with a protocol and later realized that
> secure messaging must be a part of that.  However, given the weirdness
> of smart cards, I found that you would also need a carefully matching
> container in order to ever get it supported inside a standard browser.

I thinks this is another story. Probably more correct or with a higher
knowledge, but "creating another standard" is not what im discussing
here.

As i asked you before, please, try to answer me this question (this
will help me undestand the problem):

I want to detect when the card is inserted, to be able to request a
cert (generate keys) inside the card (only).
Is "want i want" a bad idea? (you can always show an alert to
allow/deny web page card access)
How could we do it? (i think pkcs#11 its a simple/clear/well-known way
of doing it)
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to