I think this is an interesting idea.
One of the disappointment of webcrypto, if I am not mistaken, is that they
confined themselves too narrowly that it did not define the APIs that can
leverage, for example, a secure element.
If a discussion here at IETF would stimulate the discussion there as well,
it would benefit the community, IMHO.

Nat

2015-04-11 19:03 GMT+09:00 Samuel Erdtman <[email protected]>:

> Hi,
>
> I think this could be interesting, don“t know if a standards for this
> should be written under IETF or somewhere else, but I can share a few use
> cases we have at neXus where we need to use platform specific capabilities.
> And a bit on how we currently solve it.
>
> * Smart Card signatures
> In e.g bank transactions signatures are desired. We develop a middleware
> with this support (has been used for the Swedish eID for many years), we
> have historically created plugins to the comunication between the browser
> and the middleware. But as NPAPI is going away we have now created a new
> architecture that relies on server component that makes it possible to open
> up a communication channel between the browser and the middleware.
>
> * RFID coding
> This is kind of like printing, when creating cards for physical access
> systems (PACS) some data has to be coded in the card or read from it as it
> is printed (Mifare Desfire etc.), for this we have a SDK/application that
> runs locally but the card management system runs in the browser. The
> communication is currently done with a socket connection to localhost, it
> works well but has some clear drawbacks e.g. TLS.
>
> * Signature pad
> * Fingerprint recording
> * Document scanning
> When doing identity management we collect data about the user when
> enrolling. Once again it is not possible to collect all this data from a
> browser i.e. we need something running locally, and we need to communicate
> with it. Currently we do a connection to localhost.
>
> * End point integrity
> We have a client application that is loaded to validate that that platform
> (OS, antivirus etc.) is updated before allowing the user to connect to the
> corporate network. And when the user is logged out it helps the user to
> clean upp downloaded files so that sensitive data gets minimal exposure.
> (this solution relies on java applet and activeX)
>
> All of these use cases would benefit form a standardised way of
> communicating from the web browser (JavaScript) with a locally installed
> application.
>
> Best Regards
> Samuel Erdtman
>
>
>
>
> On Fri, Mar 20, 2015 at 8:30 AM, Hannes Tschofenig <
> [email protected]> wrote:
>
>> I like the proposal Anders put forward.
>> Doing some work in the IETF in that area might not be a bad idea to
>> stimulate discussions.
>>
>> Ciao
>> Hannes
>>
>>
>> On 03/20/2015 06:49 AM, Anders Rundgren wrote:
>> > On 2015-03-19 19:15, John Bradley wrote:
>> >> It sounds like WebCrypto or something more related to it.
>> >> http://www.w3.org/2012/webcrypto/
>> >
>> > I would rather characterize this as the opposite to WebCrypto since the
>> > referred schemes
>> > all are based on the idea that "The Web is not enough".
>> >
>> > That is, the Web needs (as proven any number of times), to be extended
>> > with its more
>> > powerful native/platform companion for a lot of reasons including access
>> > to platform-
>> > resident keys as well as breaking away from the crippling SOP notion.
>> >
>> > The W3C does not appear to be a suitable home for such an effort, they
>> > rather prefer
>> > continuing the so far pretty unsuccessful efforts DUPLICATING the native
>> > level into
>> > the Web [1], instead of recognizing the power of COMBINING these worlds.
>> >
>> > Cheers,
>> > Anders
>> >
>> > 1]
>> https://lists.w3.org/Archives/Public/public-sysapps/2014Dec/0000.html
>> >
>> >>
>> >>
>> >>> On Mar 19, 2015, at 3:05 PM, Jim Schaad <[email protected]
>> >>> <mailto:[email protected]>> wrote:
>> >>>
>> >>> To me this sounds more like a W3C activity than an IETF activity.
>> >>> Jim
>> >>> *From:*jose [mailto:[email protected]]*On Behalf Of*Anders
>> Rundgren
>> >>> *Sent:*Wednesday, March 18, 2015 10:41 PM
>> >>> *To:*[email protected] <mailto:[email protected]>
>> >>> *Subject:*[jose] Charter Proposal: "Trusted Code" for the Web
>> >>> Trusted Code for the Web
>> >>>
>> >>>
>> >>> Existing security-related applications like authentication, payments,
>> >>> etc. are all based on that a core-part is executed by statically
>> >>> installed software that is supposed to be TRUSTED.
>> >>>
>> >>> Since web-based applications are transiently downloaded, unsigned and
>> >>> come from any number of more or less unknown sources, such
>> >>> applications are by definition UNTRUSTED.
>> >>>
>> >>> To compensate for this, web-based security applications currently
>> >>> rely on a hodge-podge of non-standard methods [1] where trusted code
>> >>> resides (and executes) somewhere outside of the actual web
>> application.
>> >>>
>> >>> However, because each browser-vendor have their own idea on what is
>> >>> secure and useful [2], interoperability has proven to be a major
>> >>> hassle.  In addition, the ongoing quest for locking down browsers (in
>> >>> order to make them more secure), tends to break applications after
>> >>> browser updates.
>> >>>
>> >>> Although security applications are interesting, they haven't proved
>> >>> to be a driver.  Fortunately it has turned out that the desired
>> >>> capability ("Trusted Code"), is also used by massively popular music
>> >>> streaming services, cloud-based storage systems, on-line gaming sites
>> >>> and open source collaboration networks.
>> >>>
>> >>> The goal for the proposed effort would be to define a vendor- and
>> >>> device-neutral solution for dealing with trusted code on the Web.
>> >>>
>> >>>
>> >>> *References
>> >>> *
>> >>> 1] An non-exhaustive list include:
>> >>> - Custom protocol handlers.  Primarily used on Android and iOS.
>> >>> GitHub also uses it on Windows
>> >>> - Local web services on 127.0.0.1.  Used by lots of services, from
>> >>> Spotify to digital signatures
>> >>> - Browser plugins like NPAPI/ActiveX.  Used (for example) by millions
>> >>> of people in Korea for PKI support but is now being deprecated
>> >>> - Chrome native messaging.  Fairly recent solution which enables
>> >>> Native <=> Web communication
>> >>>
>> >>> 2]https://code.google.com/p/chromium/issues/detail?id=378566
>> >>>
>> >>> _______________________________________________
>> >>> jose mailing list
>> >>> [email protected] <mailto:[email protected]>
>> >>> https://www.ietf.org/mailman/listinfo/jose
>> >>
>> >
>> > _______________________________________________
>> > jose mailing list
>> > [email protected]
>> > https://www.ietf.org/mailman/listinfo/jose
>>
>>
>> _______________________________________________
>> jose mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/jose
>>
>>
>
> _______________________________________________
> jose mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/jose
>
>


-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to