Re: Verify signText() on server

2006-07-18 Thread Arshad Noor
While it is possible to verify CMS messages using the Java Security APIs directly, the Mozilla JSS and the BouncyCastle providers provide CMS-specific classes that encapsulate a lot of the lower-level APIs, making it easier to deal with CMS objects. http://www.mozilla.org/projects/security/pki/js

Re: Platform Attestation. was:To SSL-client-auth or not toSSL-client-auth, that is the question(?)

2006-07-18 Thread Anders Rundgren
Hi Kyle, c-i-l >It's flat-out impossible to make a "trusted platform" assertion. It is hard to see why Microsoft, Cisco and the IETF have all come out with "standards" in this space if this is a "universal truth". >(Reference Apple's OSX-Intel debacle when hackers just bypassed the >trusted chi

Re: Platform Attestation. was:To SSL-client-auth or not to SSL-client-auth, that is the question(?)

2006-07-18 Thread Kyle Hamilton
On 7/17/06, Anders Rundgren <[EMAIL PROTECTED]> wrote: Hi Julien, My posting MAY be considered as a "speculation" since this has not happened yet. The reason why this *could* become a reality is the success of web-based services including outsourced dittos. The latter seriously limits the appli

Re: Platform Attestation. was:To SSL-client-auth or not to SSL-client-auth, that is the question(?)

2006-07-18 Thread Kyle Hamilton
It's flat-out impossible to make a "trusted platform" assertion. (Reference Apple's OSX-Intel debacle when hackers just bypassed the trusted chip in its software. Reference also the DVD encryption mechanism.) When the hardware is physically in control of a user, it cannot be deemed 'secure' unde