-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


On 03/07/2015 01:20 AM, Paul Theriault wrote:
> In general I think the next step here is to flesh out what some of 
> these services might do?  I'm struggling to think of actual 
> services that would support gaia use cases in a safe way but its 
> probably worth exploring, if only to better understand the APIs we 
> need for gaia.

Paul and I were discussing this in the context of the proposed
crypto-ish hardware framework. I'm replying here to get some more
eyes on what we discussed.

Using apps to provide services via IAC of some form is a good approach
to adding support for crypto-ish hardware (e.g. secure elements,
yubikeys, hardware bitcoin wallets, hardware entropy sources, etc).

What I'd like to see is crypto-ish hardware manufacturers creating
signed apps that we can grant access to restricted APIs for talking to
their hardware (i.e. Yubico writes a signed Yubikey app that gets
access to their hardware and can respond to IAC requests from other apps
).

This avoids having to figure out how to give 3rd party apps direct
access to the hardware. It puts the responsibility of supporting a
piece of hardware into the hands of the manufacturer. It allows for
supporting a multiplicity of crypto-ish hardware without having a
specific API for each one.

I'm currently attempting to build a prototype certified app that will
access a Secure Element and respond to IAC requests from other
certified apps.

Some of the prototype use cases we've thought of are:

1. Storing an encryption key on the Secure Element and using it to
encrypt/decrypt email credentials so that we no longer store them in
the clear.

2. Creating a generic key store Secure Element applet and allowing
other apps to generate and store the keys on the Secure Element
instead of on the flash.

3. Implementing a shared secret + time one-time-password applet for
the Secure Element and using that for two-factor auth.

Ultimately, I want 3rd-party apps to be able to talk to the service
apps, but for now I'm just trying to prove that this is viable for
certified apps.

WDYT?

- --dave
-----BEGIN PGP SIGNATURE-----
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=PNHk
-----END PGP SIGNATURE-----
_______________________________________________
dev-b2g mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-b2g

Reply via email to