On Sat, May 9, 2015 3:30 pm, David Woodhouse wrote:
>  On Fri, 2015-05-08 at 15:07 -0700, Ryan Sleevi wrote:
> > Yes, it should. You'll introduce your users to a host of security issues
> > if you ignore them (especially for situations like Chrome). For example,
> > if you did what you propose to do, you'd be exposing people's smart card
> > modules to arbitrary sandboxed Chrome processes
>
>  So arbitrary sandboxes Chrome processes already have free rein to use
>  certificates in my NSS database? Isn't that a problem *already*? And if
>  people ever want to use the PKCS#11 token in their web browser, they're
>  going to need to expose it anyway. And if they don't, the p11-kit
>  configuration does permit a module to be visible in some applications
>  and not others.

No David, that's quite the opposite of what I was saying. If you did what
you propose - patching to ignore the noModDB & friends - you'd be
introducing security issues. The security issues do not exist now. Your
patch would introduce them.

You don't need to expose it to the sandbox to use PKCS#11 in the web
browser. That's not how modern sandboxed browsers work.

And yes, your conclusion further emphasizes my original point - some
applications explicitly do not wish to have p11-kit introduced, and by
just blithely introducing it, you're introducing security vulnerabilities.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to