Thanks Nelson for explaining this.

I also understand your worries regarding what to sign and I would
be very dishonest if I said I have "solved" it.  In fact, my design
doesn't even address this issue (!) except that if of course builds
on the assumption that at least the "viewer" works as expected.

Now, why don't I feel that this is a huge limitation?

First a legal issue.  Based on *actual* court cases you can indeed be
convicted based on IP addresses if you are found downloading forbidden
data.  I.e. digital signatures are simply a stronger evidence.

Then a practical issue.  If a crooked site asks you to sign a form
that in some way is camouflaged (using overlaid HTML) into
something else, the question is really what the crooked site can
do with that unless the crooked site actually is a genuine representative
of your government, bank, or employer.

That is, in spite of all the legal "trauma" associated with signatures,
authentication is actually MUCH more critical because there is nothing
to repudiate in the case somebody cracked your medical file etc.

You may be interested (still awake?) knowing that payment operations
in brick-and-mortar shops is ultimately the most important application for
the suggested scheme. Since this list doesn't really work with payments,
I won't bore you to death with how this is supposed to work, but it does!

Anders

If you really want to test Web Signing you can try this proxy setup
http://upi-using-service.webpki.org/IncomeDeclaration
use PIN 1234  :-)

----- Original Message ----- 
From: "Nelson Bolyard" <[EMAIL PROTECTED]>
To: "mozilla's crypto code discussion list" <[email protected]>
Sent: Thursday, November 20, 2008 00:07
Subject: Web signing?


Eddy Nigg wrote:
> On 11/19/2008 05:52 PM, Anders Rundgren:
>> In the meantime, wouldn't it be of some value if Mozilla tried to
>> satisfy a PKI-
>> related activity that in number of users, already is much bigger than
>> S/MIME,
>> i.e. the concept of "Web Signing"?
> 
> What is this supposed to be? Perhaps I missed it?

I think this is a reference to the action historically called "form signing"
(or more accurately "form post signing") in Mozilla.  It's a way to sign the
data being sent in to a web server with the user's private key, as the data
is being sent.  Mozilla implements this with a javascript extension known
as "crypto.signtext".  I think IE implements it with an ocx (an Active-X
module).  There doesn't seem to be any standard for a way make this work
that is common to all browsers.   NSS provides the necessary crypto code.
What's missing is the definition of the way (syntax) by which to invoke it
in the browser.  If I recall correctly, Anders has proposed something for
that purpose, and perhaps he has developed some software for that purpose.

There are some fundamental issues with this stuff, such as, how does the
user know what he's being asked to sign?  How does he know that he's not
being asked to sign a document conveying the deeds for all his real property
to the web site owner? In some countries where digital signatures have the
full force of law, just like a real signature, this could be a serious issue.
I'm personally wary of efforts that push to make it possible for users to
make such legally effective signatures without solving the problems of how
to protect the user.
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to