On Thu, Apr 26, 2012 at 12:32 AM, helpcrypto helpcrypto <helpcry...@gmail.com> 
wrote:
Supporting smart cards in the spec and first implementations is not a goal, 
however, I think a lot of the base work we are doing will help in a future 
iteration. For instance, I hope that this Gecko 'internal API' will help 
extension and browser developers to experiment with smartcards, crypto keys, 
etc.

Really happy to hear. Keep us updated when some work is made!

Are you saying you base64 encode the data to be signed before the signature is 
created?

No. Let me show you an example.
Consider you provide this API:
   sign(keyId, data)
IMHO, the correct way of invoking wil be:
   sign(1,"ZGF0YXRvYmVzaWduZWQ=")
Inseatd of (cause it can end in encoding translation problem)
   sign(1,"datatobesigned")

For example, using iso-8859-1 and UTF-8 this string is not the same
"En España el Paragüas es invisíble"

This is what the unique tags on ASN.1 UTF8String and IA5String and 
PrintableString and Shift-JIS and such are for, specifying the encoding.

Public key as a privacy risk? I don't imagine we will have an address bound the 
the public key.

My X509 cert has my name, surname, identity ID...i dont want ANY site,
(except those requiring SSL client authentication like Tax ministry)
have any access to it.
My public key has a unique hash that could (easily) be used to track a
user. I dont want that either.

The certificate is not the public key.  The public key is the only identity the 
computer can comprehend, and the certificate is metadata about the key which is 
(ideally) trusted for fiduciary work.  The public key itself is its own 
identity as well, so your point doesn't even rely on having a unique hash.

But!  Here's someone who actually thinks like I do, that this information has 
value, and therefore this information must be protected.

Fortunately, I have something for that.  Behold: the Identity Trustee.  This is a 
certifier which would accept your current certificate and a newly generated public key, 
both signed by both the certified keypair and the generated keypair.  It would then sign 
a certificate for the generated public key which says, basically, "I know who this 
keyholder is, but I will only tell valid state authority."

This would permit site owners to discourage spam and vandalism by knowing that 
they can hold the keyholder accountable if necessary, without disclosing the 
keyholder's (your) identity to every site, and without requiring the same key 
to be used on every site.  Effectively, your public key would become your 
pseudonym.  And, this is not a usage which would have the potential to endanger 
broad swaths of Mozilla's user base like the DigiNotar google.com certificate.

-Kyle H
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to