On Mon, Feb 2, 2015 at 8:44 AM, Adam Roach <[email protected]> wrote:

>  On 2/2/15 10:08, Shane Tomlinson wrote:
>
>  My head is spinning, though I'm sure it'll become more clear as I
> re-read the threads. One comment from rfk's email [1] from December:
>
> > Chris also suggested that the encryption keys may not need to transit
> the server at all, but could instead be communicated from content-server to
> relier via a client-side postMessage API. I don't know much about
> postMessage but it sounds worth exploring.
>
>  This is only possible if an iframe is involved somehow. Either the relier
> embeds the content server into its page (e.g., the lightbox flow[2]), or
> the relier embeds a hidden content server iframe in its page.
>
>
> This sounds like the general solution that Chris was saying is more
> complex than what we would need to make use of user keys in trusted Desktop
> code. Am I reading that correctly?
>
>
Yes. The way that we communicate with Loop is that the FxA page just fires
an event on it’s own page, which requires special (i.e., chrome) privilege
to receive. A more general solution that involves sending keys over
postMessage will require more security review, IMO.

-chris





> --
>  Adam Roach
> Principal Platform Engineer
> [email protected]
> +1 650 903 0800 x863
>
_______________________________________________
Dev-fxacct mailing list
[email protected]
https://mail.mozilla.org/listinfo/dev-fxacct

Reply via email to