Julien Pierre wrote:
> Jay Potter wrote:
> >Any suggestions on what I would need to do to get this implimented?
>
> A lot of convincing that it is worth doing, to begin with. IMO,
> pre-shared keys have no place in a general-purpose Internet browser such
> as Mozilla. The authors of RFC4279 agr
Nelson,
Ideally I would like to have my USB device generate an AES-256 session
key directly and make it available for TLS use. There would be devices
on both the client and the server to provide the hardware security.
This would greatly spead up the authentication process along with
increasi
Jay Potter wrote:
> Can a PKCS#11 module be proprietary? I would not want to publicize the
> intricacies of the USB device, but rather provide a mechanism where
> others could utilize its capabilities within their own projects.
Yes, the whole point of PKCS#11 is to allow makers of proprietary cr
Jay Potter wrote:
Can a PKCS#11 module be proprietary?
Yes. As far as I know most if not all PKCS#11 modules for real-life
hardware tokens are distributed under proprietary licenses in binary
form only. The Mozilla source code used in, e.g., Firefox is made
available under the Mozilla Public
Nelson B wrote:
Jay Potter wrote:
Nelson,
We are planning on using a USB device that has keys for various vendors
in a "private" area. The USB device can generate a session key based
upon that secret vendor key. The Server can autogenerate that same
session key. The session key does not hav
Jay Potter wrote:
> Nelson,
>
> We are planning on using a USB device that has keys for various vendors
> in a "private" area. The USB device can generate a session key based
> upon that secret vendor key. The Server can autogenerate that same
> session key. The session key does not have to be
Nelson,
We are planning on using a USB device that has keys for various vendors
in a "private" area. The USB device can generate a session key based
upon that secret vendor key. The Server can autogenerate that same
session key. The session key does not have to be passed.
The external mod
Jay Potter wrote:
> Hi, I'm new to NSS. I'm involved with a project that uses Pre-Shared
> Keys for TLS - AES-256. (RFC 4279). I get the key from an external
> module (both Client and Server). This implementation would be perfect
> for my application. I would like to see Mozilla handle this ci
Jay Potter wrote:
Any suggestions on what I would need to do to get this implimented?
A lot of convincing that it is worth doing, to begin with. IMO,
pre-shared keys have no place in a general-purpose Internet browser such
as Mozilla. The authors of RFC4279 agree - see section 1.1 .
" T
Hi, I'm new to NSS. I'm involved with a project that uses Pre-Shared
Keys for TLS - AES-256. (RFC 4279). I get the key from an external
module (both Client and Server). This implementation would be perfect
for my application. I would like to see Mozilla handle this cipher set.
Any suggest
10 matches
Mail list logo