On Fri, September 27, 2013 4:09 pm, Eddy Nigg wrote:
>  On 09/28/2013 01:59 AM, From Ryan Sleevi:
> > If your site requires a client certificate, and you know that a client
> > certificate is stored in a smart card, then you also know that when
> > using
> > Firefox, and the smart card is removed, Firefox will invalidate that
> > SSL/TLS session.
>
>  Not really - except in case you require the cert authentication on every
>  exchange between the client and server. I don't believe that many do
>  this as it makes it incredible slow and some browser will prompt for the
>  certificate over an over again.

But Firefox (and Chrome, IE, Safari, and Opera) won't.

I'm not sure FIrefox supporting some non-Web Platform feature on the basis
that some other browser makes it hard, especially when the number of
browsers that support the feature beyond Firefox is 0.

>
> > When the user removes their smart card, the SSL/TLS session is
> > invalidated, and the
> > user is 'logged out'.
>
>  Kind of, he'll get the infamous ssl_error_handshake_failure_alert error
>  that nobody knows what it is, but that's not how such web apps are
>  usually implemented. They do the client authentication dance once and
>  continue with a application controlled session.

And such webapps could presumably use iframes or XHRs with a background
refresh to a login domain, and when such a fetch fail, know the smart card
was removed, and thus treat it as the same. All without non-standard
features being exposed.

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to