>> ie: javascript invoke getKeyFromPKCS11("modulename") and "#1" is
>> returned, but can be used.
>
> How do you envision that this access should be controlled?
> Here imagine that you have dozens of keys, not just a single key in a smart 
> card.

The same way as SSL client authentication: with a dialog letting the
user select between the certs stored on that pkcs#11.


> A difference to keys compared to for example "your location" (which is
> exclusively your resource) is that keys in most cases are given to users
> by external providers.  The providers do not want their keys to be misused,
> particularly not by users who accidentally made the wrong trust assertion.

IIUC, you mean "keys from A certificate authority intended to be used
in domain X shouldnt be (ab)used by domain Y"?
Is that what you mean?


> A scheme that doesn't take this in account IMO has little chance of getting
> market acceptance.

Maybe i didnt explained myselft properly. Im not suggesting a "new
scheme", just making this JS crypto library "backwards compatible"
with the system currently using.


> In my professional life I deal with PKIs for EAC (Extended Access Control)
> which is used in e-passports for selective access to biometric information.
> Using EAC it is the *passport* that grants access based on credentials 
> provided
> by the inspection systems so what I'm proposing is by no means a "novelty";
> it just haven't reached the web.  Yet.

As with other issues, i probably lack of needed skills and knowledge
to discuss these things. Im just a developer which uses Java applets
cause theres no better alternative.
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to