On 2014-10-24 07:11, Daniel Veditz wrote:
Your subject, "time to dump NSS", intimately affects NSS developers who
will have to worry about replacing all the things NSS does for us before
they can even start to think about the additional concepts.

I fully understand that.

If you're proposing a mechanism that can live on the side without
actually dumping NSS then I suppose we can discuss it elsewhere,

According to Paul T Mozilla have such discussions but they are not public
(HW-vendors like to plot in secrecy) so it is not obvious how to go forward.
I would consider a task-force.

The idea is creating a new secure core based on a TEE like Apple and Google 
have.
The new core would indeed have to support legacy APIs like NSS.


but if it involves cryptography (how could it not?) then the tech.crypto group
is the one the people who know about cryptography participate in.

It would be a combination of crypto and OS architecture, perhaps like:
http://webpki.org/papers/SKS-KeyGen2_FullStack.pdf


There are several (sometimes competing) efforts within the W3 and IETF
to create standards around concepts like key management. We're unlikely
to implement a solution that doesn't get buy-in from other browser and
server makers in that kind of forum.

So far nobody has done anything even close to what I'm proposing.
Well, Apple may have but they didn't take it to standardization yet.
I believe that's very wise, complex stuff must mature in the real world first.

I don't think an SDO can take on a project of this kind.  SDOs only
deal with partial solutions which is why we during the 20 years with
credit-card payments on the web haven't moved one inch forward to make
them Secure AND Convenient.

Anyway, you wouldn't necessarily have to start from zero in case Mozilla
feels that the groundwork me and my colleges have done could be useful.

Regards,
Anders Rundgren



-Dan Veditz


--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to