On 8/8/13 7:22 AM, Andrei Sambra wrote:
On Wed, Aug 7, 2013 at 7:34 PM, Nick Jennings <[email protected] <mailto:[email protected]>> wrote:

    Hi Kingsley,

     Thanks for the links. Trying out the first link
    (http://youid.openlinksw.com/) now, some notes:
    2. With firefox, after filling out the form, I get a download
    dialogue for the cert instead of it installing into the browser.
    So I saved, then went into preferences and "import" ... which was
    successful with "Successfully restored your security
    certificate(s) and private key(s)". Previously, with my-profile.eu
    <http://my-profile.eu>, this was automatically installed into the
    browser (I was using Chrome then). Though I guess it's better to
    have it export/save by default so you can install the same cert on
    any number of browsers without hassle. Still, it creates more
    steps and could be confusing for new users.


Downloading the cert means that it was generated on the server side, thus the server has knowledge of your private key -> BAD. Using the HTML5 <KEYGEN> element is always preferred in this case, which is currently the case for my-profile.eu <http://my-profile.eu> and rww.io <http://rww.io>.
Re., what you assume is BAD:

You have a tradeoff, store to pkcs#12 or to browser.

We default to saving pkcs#12 while <keygen/> is an option too. Remember, privacy is about *self-calibration* of one's vulnerabilities, so we prefer to provide options to app/service users rather than mandating a single option.

Remember, WebID+TLS is not basic PKI meaning: we have a composite of items that challenge compromise feasibility:

1. keypairs
2. agent identity
3. entity relationship semantics.

Take any of the items above out of the composite and the WebID+TLS authentication challenge fails. In the context of Webby-PKI (which is what WebID+TLS is about), the private key doesn't have the *pivotal role* it had re. basic PKI.

Also note, pkcs#12 files (re. YouID) are actually generated on the mobile device (iPhone for now with Android arriving any second). It is no different to generating a certificate using Keychain on Mac OS X [1].


Links:

1. http://bit.ly/SuMWP4 -- creating an X.509 certificate bearing a WebID (HTTP URI that denotes an Agent) using Mac OS X Keycain (which Apple forgot to port ot iOS) .

--

Regards,

Kingsley Idehen 
Founder & CEO
OpenLink Software
Company Web: http://www.openlinksw.com
Personal Weblog: http://www.openlinksw.com/blog/~kidehen
Twitter/Identi.ca handle: @kidehen
Google+ Profile: https://plus.google.com/112399767740508618350/about
LinkedIn Profile: http://www.linkedin.com/in/kidehen




Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

Reply via email to