On Fri, Feb 15, 2013 at 12:32 PM, helpcrypto helpcrypto
<helpcry...@gmail.com> wrote:
>> The problem with this approach is that you expose keys to arbitrary 
>> javascript
>> code which is rather different to for example TLS-client-certificate
>> authentication which only exposes a high-level mechanism as well as a
>> [reasonably] secure credential filtering scheme and user GUI.
>
> clear as water.
>
> Shouldnt we be able to expose "key handles" rather than keys?
> ie: javascript invoke getKeyFromPKCS11("modulename") and "#1" is
> returned, but can be used.

I think we all mean "key handles" instead of "plaintext key material"
but the problem is the same - keys get exposed "naked" and can be
(ab)used for whatever.

Martin
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to