Thanks. I will have a look at.

Cheers,

Nat

2015-04-14 22:17 GMT+09:00 Kathleen Moriarty <
[email protected]>:

>
>
> Sent from my iPhone
>
> > On Apr 14, 2015, at 1:36 AM, Anders Rundgren <
> [email protected]> wrote:
> >
> >> On 2015-04-14 05:20, Nat Sakimura wrote:
> >> I think this is an interesting idea.
> >> One of the disappointment of webcrypto, if I am not mistaken, is that
> they confined themselves
> > > too narrowly that it did not define the APIs that can leverage, for
> example, a secure element.
> >
> > There are many ways of expressing why it didn't work out as anticipated.
> IMO, if existing
> > applications had been "decomposed", it had been more obvious that they
> work because they
> > don't expose sensitive cryptographic APIs to arbitrary Web code.  I.e.
> there's a reason why
> > we after 20 years with secure payment cards still can't use them on the
> Web!
> >
> > I'm thinking about a system where locally "Trusted Applications" are
> "talking" with
> > untrusted Web pages:
> >
> https://cyberphone.github.io/openkeystore/resources/docs/web2native-bridge.pdf
> > A predecessor is already available in the Chrome browser.
> >
> > It turned out that the very same concept could probably also be applied
> to devices
> > connected with NFC/Bluetooth:
> >
> https://cyberphone.github.io/openkeystore/resources/docs/webnfc--web2device-bridge.pdf
> >
> > Anders
> >
> >
> >> If a discussion here at IETF would stimulate the discussion there as
> well, it would benefit the community, IMHO.
> >>
> >> Nat
> >>
> >> 2015-04-11 19:03 GMT+09:00 Samuel Erdtman <[email protected] <mailto:
> [email protected]>>:
> >>
> >>    Hi,
> >>
> >>    I think this could be interesting, don“t know if a standards for
> this should be written under IETF or somewhere else, but I can share a few
> use cases we have at neXus where we need to use platform specific
> capabilities. And a bit on how we currently solve it.
> >>
> >>    * Smart Card signatures
> >>    In e.g bank transactions signatures are desired. We develop a
> middleware with this support (has been used for the Swedish eID for many
> years), we have historically created plugins to the comunication between
> the browser and the middleware. But as NPAPI is going away we have now
> created a new architecture that relies on server component that makes it
> possible to open up a communication channel between the browser and the
> middleware.
> >>
> >>    * RFID coding
> >>    This is kind of like printing, when creating cards for physical
> access systems (PACS) some data has to be coded in the card or read from it
> as it is printed (Mifare Desfire etc.), for this we have a SDK/application
> that runs locally but the card management system runs in the browser. The
> communication is currently done with a socket connection to localhost, it
> works well but has some clear drawbacks e.g. TLS.
> >>
> >>    * Signature pad
> >>    * Fingerprint recording
> >>    * Document scanning
> >>    When doing identity management we collect data about the user when
> enrolling. Once again it is not possible to collect all this data from a
> browser i.e. we need something running locally, and we need to communicate
> with it. Currently we do a connection to localhost.
> >>
> >>    * End point integrity
> >>    We have a client application that is loaded to validate that that
> platform (OS, antivirus etc.) is updated before allowing the user to
> connect to the corporate network. And when the user is logged out it helps
> the user to clean upp downloaded files so that sensitive data gets minimal
> exposure. (this solution relies on java applet and activeX)
> >>
>
> This is similar to what NEA and SACM are working on, but their definition
> of end point is not scoped to just a browser or application.  For this
> interested in this question, please take a look at SACM and proposed
> solutions can be reviewed there.  They have an open call for proposals and
> recognize that different solutions will be needed depending on re platform
> being assessed.
>
> Best regards,
> Kathleen
>
> >>    All of these use cases would benefit form a standardised way of
> communicating from the web browser (JavaScript) with a locally installed
> application.
> >>
> >>    Best Regards
> >>    Samuel Erdtman
> >>
> >>
> >>
> >>
> >>    On Fri, Mar 20, 2015 at 8:30 AM, Hannes Tschofenig <
> [email protected] <mailto:[email protected]>> wrote:
> >>
> >>        I like the proposal Anders put forward.
> >>        Doing some work in the IETF in that area might not be a bad idea
> to
> >>        stimulate discussions.
> >>
> >>        Ciao
> >>        Hannes
> >>
> >>
> >>        On 03/20/2015 06:49 AM, Anders Rundgren wrote:
> >>         > On 2015-03-19 19:15, John Bradley wrote:
> >>         >> It sounds like WebCrypto or something more related to it.
> >>         >> http://www.w3.org/2012/webcrypto/
> >>         >
> >>         > I would rather characterize this as the opposite to WebCrypto
> since the
> >>         > referred schemes
> >>         > all are based on the idea that "The Web is not enough".
> >>         >
> >>         > That is, the Web needs (as proven any number of times), to be
> extended
> >>         > with its more
> >>         > powerful native/platform companion for a lot of reasons
> including access
> >>         > to platform-
> >>         > resident keys as well as breaking away from the crippling SOP
> notion.
> >>         >
> >>         > The W3C does not appear to be a suitable home for such an
> effort, they
> >>         > rather prefer
> >>         > continuing the so far pretty unsuccessful efforts DUPLICATING
> the native
> >>         > level into
> >>         > the Web [1], instead of recognizing the power of COMBINING
> these worlds.
> >>         >
> >>         > Cheers,
> >>         > Anders
> >>         >
> >>         > 1]
> https://lists.w3.org/Archives/Public/public-sysapps/2014Dec/0000.html
> >>         >
> >>         >>
> >>         >>
> >>         >>> On Mar 19, 2015, at 3:05 PM, Jim Schaad <
> [email protected] <mailto:[email protected]>
> >>         >>> <mailto:[email protected] <mailto:
> [email protected]>>> wrote:
> >>         >>>
> >>         >>> To me this sounds more like a W3C activity than an IETF
> activity.
> >>         >>> Jim
> >>         >>> *From:*jose [mailto:[email protected] <mailto:
> [email protected]>]*On Behalf Of*Anders Rundgren
> >>         >>> *Sent:*Wednesday, March 18, 2015 10:41 PM
> >>         >>> *To:*[email protected] <mailto:[email protected]> <mailto:
> [email protected] <mailto:[email protected]>>
> >>         >>> *Subject:*[jose] Charter Proposal: "Trusted Code" for the
> Web
> >>         >>> Trusted Code for the Web
> >>         >>>
> >>         >>>
> >>         >>> Existing security-related applications like authentication,
> payments,
> >>         >>> etc. are all based on that a core-part is executed by
> statically
> >>         >>> installed software that is supposed to be TRUSTED.
> >>         >>>
> >>         >>> Since web-based applications are transiently downloaded,
> unsigned and
> >>         >>> come from any number of more or less unknown sources, such
> >>         >>> applications are by definition UNTRUSTED.
> >>         >>>
> >>         >>> To compensate for this, web-based security applications
> currently
> >>         >>> rely on a hodge-podge of non-standard methods [1] where
> trusted code
> >>         >>> resides (and executes) somewhere outside of the actual web
> application.
> >>         >>>
> >>         >>> However, because each browser-vendor have their own idea on
> what is
> >>         >>> secure and useful [2], interoperability has proven to be a
> major
> >>         >>> hassle.  In addition, the ongoing quest for locking down
> browsers (in
> >>         >>> order to make them more secure), tends to break
> applications after
> >>         >>> browser updates.
> >>         >>>
> >>         >>> Although security applications are interesting, they
> haven't proved
> >>         >>> to be a driver.  Fortunately it has turned out that the
> desired
> >>         >>> capability ("Trusted Code"), is also used by massively
> popular music
> >>         >>> streaming services, cloud-based storage systems, on-line
> gaming sites
> >>         >>> and open source collaboration networks.
> >>         >>>
> >>         >>> The goal for the proposed effort would be to define a
> vendor- and
> >>         >>> device-neutral solution for dealing with trusted code on
> the Web.
> >>         >>>
> >>         >>>
> >>         >>> *References
> >>         >>> *
> >>         >>> 1] An non-exhaustive list include:
> >>         >>> - Custom protocol handlers.  Primarily used on Android and
> iOS.
> >>         >>> GitHub also uses it on Windows
> >>         >>> - Local web services on 127.0.0.1.  Used by lots of
> services, from
> >>         >>> Spotify to digital signatures
> >>         >>> - Browser plugins like NPAPI/ActiveX.  Used (for example)
> by millions
> >>         >>> of people in Korea for PKI support but is now being
> deprecated
> >>         >>> - Chrome native messaging.  Fairly recent solution which
> enables
> >>         >>> Native <=> Web communication
> >>         >>>
> >>         >>> 2]
> https://code.google.com/p/chromium/issues/detail?id=378566
> >>         >>>
> >>         >>> _______________________________________________
> >>         >>> jose mailing list
> >>         >>> [email protected] <mailto:[email protected]> <mailto:[email protected]
> <mailto:[email protected]>>
> >>         >>> https://www.ietf.org/mailman/listinfo/jose
> >>         >>
> >>         >
> >>         > _______________________________________________
> >>         > jose mailing list
> >>         > [email protected] <mailto:[email protected]>
> >>         > https://www.ietf.org/mailman/listinfo/jose
> >>
> >>
> >>        _______________________________________________
> >>        jose mailing list
> >>        [email protected] <mailto:[email protected]>
> >>        https://www.ietf.org/mailman/listinfo/jose
> >>
> >>
> >>
> >>    _______________________________________________
> >>    jose mailing list
> >>    [email protected] <mailto:[email protected]>
> >>    https://www.ietf.org/mailman/listinfo/jose
> >>
> >>
> >>
> >>
> >> --
> >> Nat Sakimura (=nat)
> >> Chairman, OpenID Foundation
> >> http://nat.sakimura.org/
> >> @_nat_en
> >
> > _______________________________________________
> > jose mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/jose
>



-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to