For NFC there has been some discussion as part of the WebNFC. IIRC they are mostly around an option scheme. WebNFC is limited to NDEF NFC tags, and I believe the proposal was to require that a tag must have a special header written which indicates it can be written by a certain domain. (Obviously nothing stops you from reading the tag with something other than a browser though)
See https://w3c.github.io/web-nfc/#dfn-web-nfc-record <https://w3c.github.io/web-nfc/#dfn-web-nfc-record> for more details. But when I mentioned NFC below, I was more meaning for it as a side-channel for authenticating devices. For example, bluetooth can use NFC for pairing, see http://nfc-forum.org/nfc-and-bluetooth-the-perfect-pair/ <http://members.nfc-forum.org/apps/group_public/download.php/18688/NFCForum-AD-BTSSP_1_1.pdf> > On 28 Dec 2015, at 3:14 pm, Naoki Hirata <nhir...@mozilla.com> wrote: > > I agree, privacy and security would definitely be a huge concern! > > I wonder if we'll have to set up a trust server or service or a whitelisting > server? Can we do that in a P2P method within the local network? > > I could foresee NFC being used to redirect a device to another device. The > main issue is hijacking and such. How do you prevent unwanted connection... > Do you have to whitelist the NFC with certain devices? Mac IP? Would fly > web server have to be adjusted to also know who to trust? > > > On Sun, Dec 27, 2015 at 7:11 PM, Paul Theriault <ptheria...@mozilla.com > <mailto:ptheria...@mozilla.com>> wrote: > This is an extremely important discussion! We’ve actually been struggling > with this exact issue for the remote control on the TV. TLS doesn’t suit > because the TV has an internal network address only (no public DNS name). > We’ve been discussing how to implement the trust relationship between the > remote control web page running on an arbitrary device/browser and the TV. > I’m not sure that this is a good solution (I’m all ears if anyone has a > suggestion) > > Some (not very well structured) thoughts on your questions in line below. > >> On 24 Dec 2015, at 12:31 am, Michiel de Jong <mbdej...@mozilla.com >> <mailto:mbdej...@mozilla.com>> wrote: >> >> Connecting from a web browser to a web site is just a special case of using >> "Device A", to connect to "Device B". Looking at the generic case where >> Device A and Device B can both be anyThing ;) brings up a few interesting >> questions: >> >> 1) How can a certificate authority vouch for the identity of Device B, if it >> does not have a URL? Unless we replace CA's with Web-of-Trust, this might be >> something to think about as more devices come into play that have no URL. > > Even with a URL, on an internal network CAs are of limited use (works for > enterprise when you can pre-install a CA, but not in the general case). But > how this “web-of-trust’ would work, I’m not sure. Exchange of CA via some > side-channel? Or maybe exchange WebRTC SDP and then you can use > dataConnection to securely communicate - but that doesn’t doesn’t solve the > problem of secure code delivery in the first place. Another option might be > to leverage an external trusted source to broker the initial communication > (https://trustedapp.marketplace.firefox.com > <http://trustedapp.marketplace.firefox.com/>) but then both devices need > access to the internet. > >> >> 2) The user might have Device B in their eye sight. Does that help? > >> >> If Device B can be many more things than just a web server in a data center, >> then you may be able to connect to it with more accuracy. For instance, by >> sticking a USB cable in it, touching it with your NFC reader, or pointing a >> camera at it. > > Definitely! There is much prior art for local-area identification and > authentication. Of the top of my head (and a quick search on the web) I can > think of: > - exchange of pin codes (e.g. bluetooth pairing) > - physical proximity (NFC, or use physical sensors, e.g. bluetooth signal > strength, or physical “bumps”) > - Visual data encoding (e.g QR codes, or > https://www.youtube.com/watch?v=sVWlQNzU4Ak > <https://www.youtube.com/watch?v=sVWlQNzU4Ak> ) > - (Ultra)Sonic data encoding ( e.g. https://github.com/borismus/sonicnet.js > <https://github.com/borismus/sonicnet.js>) > > It might be interesting to consider a standard approach for exchanging > authentication information (i’d be surprised if there wasn’t any standards in > this space actually) > >> 3) How can you accurately connect to a device if you have no URL, and also >> no physical proximity? >> >> I'm not talking about how to protect Device B from unauthorized access (WPS >> buttons on WiFi routers etc.). What interests me is how you as a user can >> accurately identify the device you are connecting *to*. > > I don’t think you can, at least automatically unless there is some prior > web-of-trust. It depends what you mean by ‘no physical proximity’ too. Do you > mean too far to use a side-channel like bluetooth, but still on the same LAN. > Or something else? Are we even talking TCP/IP here or something completely > seperate? > >> >> Curious if anyone has more thoughts on this! :) > > Me too! Im afraid I’ve not seen any good solutions in this space as yet but > I’ve only just started digging. > > >> >> >> Cheers, >> Michiel. >> _______________________________________________ >> dev-fxos mailing list >> dev-fxos@lists.mozilla.org <mailto:dev-fxos@lists.mozilla.org> >> https://lists.mozilla.org/listinfo/dev-fxos >> <https://lists.mozilla.org/listinfo/dev-fxos> > > > _______________________________________________ > dev-fxos mailing list > dev-fxos@lists.mozilla.org <mailto:dev-fxos@lists.mozilla.org> > https://lists.mozilla.org/listinfo/dev-fxos > <https://lists.mozilla.org/listinfo/dev-fxos> > >
_______________________________________________ dev-fxos mailing list dev-fxos@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-fxos