On Fri, Feb 15, 2013 at 12:32 PM, helpcrypto helpcrypto <helpcry...@gmail.com> wrote: >> The problem with this approach is that you expose keys to arbitrary >> javascript >> code which is rather different to for example TLS-client-certificate >> authentication which only exposes a high-level mechanism as well as a >> [reasonably] secure credential filtering scheme and user GUI. > > clear as water. > > Shouldnt we be able to expose "key handles" rather than keys? > ie: javascript invoke getKeyFromPKCS11("modulename") and "#1" is > returned, but can be used.
I think we all mean "key handles" instead of "plaintext key material" but the problem is the same - keys get exposed "naked" and can be (ab)used for whatever. Martin -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto