On Wed, Dec 17, 2014 at 12:44 PM, Ryan Kelly <[email protected]> wrote:

> On 18/12/2014 01:54, Tarek Ziade wrote:
>
>> On Wed, Dec 17, 2014 at 11:44 AM, Ryan Kelly <[email protected]
>> <mailto:[email protected]>> wrote:
>>
>>     I'd love to avoid public-key crypto here...perhaps there's a way for
>>     the content-server to generate a symmetric encryption secret and
>>     communicate it directly back to the relier without it transiting our
>>     servers?
>>
>> There's one semi-related use case we need to cover - that I guess is a
>> complement from what you have described:
>>
>> The ability to discover an FxA user, and their public key (or whatever
>> public key we can use to send the user encrypted data.)
>> In other words, a browseable user directory ala LDAP like what SKS
>> provides (or closer to us, Mozillians)
>>
>
> I'd like for this to be done as a layer above the core FxA auth/oauth
> infrastructure.  It could be part of the profile server, or could be done
> as a separate "fxa-pubkey-server".  But this user public key should not be
> derived from the core kA/kB key material.
>
> My hope is that this proposal, or something like it, gives you everything
> you need to implement the above as a separate oauth service provider.
>

Seconded: this is a consumer of the key-providing service that rfkelly is
mooting.

I'd also like to ask we "need to cover" this service.  This is the kind of
service that I see no reason for Mozilla to provide.  GPG and maybe
keybase.io do similar things, and I'm pretty convinced neither have taken
the consumer market by storm.  I can see some neat applications, but none
that are particularly compelling.  What am I missing?

Nick
_______________________________________________
Dev-fxacct mailing list
[email protected]
https://mail.mozilla.org/listinfo/dev-fxacct

Reply via email to